Cyber Blog

Predicting the Cyber Future

August 3, 2016
By George I. Seffers

One of the biggest advances in the near future likely will be the convergence of major military networks into one unified Department of Defense Information Network (DODIN), predicts Ronald Pontius, deputy to the commanding general, U.S. Army Cyber Command and Second Army. And that network will be operated and maintained by Signal Corps soldiers.

Russia Employs Full Range of Information Warfare Capabilities

August 2, 2016
By George I. Seffers
Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence, speaks at TechNet Augusta on August 2, 2016.

The Russian Federation forces are using a wide array of cyber and electronic warfare capabilities unlike anything U.S. forces have faced in the past 16 years. Russia uses its sophisticated capabilities to detect, locate and eliminate enemy forces, according to Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence.

Researchers Develop Wireless Malware Detection Technique

August 1, 2016

The technique, known as Zero-Overhead Profiling, will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. 

Four Strategies the DOD Can Implement to Increase Cybersecurity

July 19, 2016
By Joe Kim

It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department's IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency. The plan segments tasks into four key "lines of effort" to strengthen cybersecurity initiatives. Read on to learn what they are and if they'll work.

    Does the Pokemon Go Craze Threaten Networks?

    July 14, 2016
    By Sandra Jontz

    Do you play Pokemon Go? The craze surrounding the augmented reality game that blends modern technology with a hint of nostalgia has resulted in a lot of benefits, from getting people outdoors to striking up conversations with strangers. But security concerns cause the hair of cybersecurity experts and privacy practitioners to stand on end worse than Brock’s.

    U.S. Army's Cyber Quest Underway in Georgia

    July 14, 2016

    The U.S. Army is testing how cyberwarriors adjust to morphing cyber threats and electromagnetic warfare (EW) attacks during its Cyber Quest 2016, an exercise now underway at the Cyber Center of Excellence at Fort Gordon, Georgia. The event examines concepts and products that could influence future technologies and requirements as well as other Army and Defense Department exercises and experiments.

    The Virtual Cybersecurity Frontier

    July 12, 2016
    By Bob Kimball

    It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The rapid adoption of software defined network (SDN) concepts and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization, writes Bob Kimball, CTO for Ciena Government Solutions.

    Cyber Readiness Means First Building the Work Force

    June 8, 2016
    By Sandra Jontz

    The world needs at least 1.5 million cybersecurity professionals who do not exist—a labor shortage created by the increase in frequency and severity of cyber attacks and employers all fishing from the same pond, said Michael Cameron, vice president for business development, cyber and cybersecurity at Leidos, during the NITEC 2016 cyber conference.

    Government Framework Offers Cybersecurity

    June 6, 2016
    By Beverly Mowery Cooper

    A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach.

    Cyber Lessons From The Panama Papers Hack

    May 23, 2016
    By Max Emelianov

    By now, you've probably heard all about the so-termed Panama Papers, one of the largest data leaks in history with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?

    Making Innovation Relevant for Operational Success

    May 19, 2016
    By Beverly Mowery Cooper
    Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

    Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

    Viewing Cyber Data in 3-D

    May 11, 2016
    By George I. Seffers
    LinQuest's cyber solution allows analysts to view data in 3-D.

    The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems.

    CyberFence Protects Critical Infrastructure

    May 11, 2016
    By George I. Seffers

    CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.

    6 Steps to Increase Cybersecurity in the Age of Innocence

    May 10, 2016
    By Ray Rothrock

    Let’s face it—we have a lot to learn about cybersecurity. Every day, we learn solutions have a short shelf life and that hackers have managed to stay a few steps ahead of those trying to track them down, shares RedSeal's CEO in a new blog.

    Situational Awareness Will Inform Risk Management Decision Making

    May 5, 2016
    By Robert B. Dix Jr.

    Cyber information sharing needs to be targeted to organizational needs throughout government and industry. Certain private sector groups are doing just that with their own form of cyber situational awareness.

    Connectivity Mayhem: Ensuring Data Security in an IoT World

    May 2, 2016
    By Joel Dolisy

    Thanks to the Internet of Things, just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.

    DISA Renames Field Command Organization

    April 26, 2016

    The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to the DISA Global Operations Command to reflect the organization’s evolution as a global service provider.

    Potential Adversaries Target U.S. Military Vulnerabilities

    April 22, 2016
    By Robert K. Ackerman

    Russia and China have built formidable military forces by focusing on perceived U.S. vulnerabilities, particularly in cyberspace.

    Simpler May Be Better for Stopping Cybermarauders

    April 22, 2016
    By Robert K. Ackerman

    Piling on complex network security measures actually may aid cyberthreats by preventing their early detection and isolation.

    Military Needs to Increase Cyber Collaboration

    April 22, 2016
    By Robert K. Ackerman

    The rapidly evolving nature of cyberspace threats may force the military to change its approach to combating digital threats.

    Pages