Cyber Blog

NATO Launches Cyber Acquisition Reform Study

October 18, 2016

NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency have launched an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes.

5 Tools for Recognizing and Combating Cybercrime

October 17, 2016
By Aubrey Merchant-Dest

Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative, a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented. The bad news is that .1 percent—or 30,000 attacks—successfully compromised a DOD cyber system.

U.S. Army Cyber Command Gets a New Commander

October 14, 2016
By Sandra Jontz

Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.

How to Report Cyber Crime

October 12, 2016
By Julianne Simpson

Federal, state and local law enforcement authorities are becoming more sophisticated about cyber attacks and devoting more resources to responding to them.

5 Tips for Creating a Cybersecurity Culture Within DOD Environments

October 11, 2016
By Aubrey Merchant-Dest

Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. It takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.

New Websites Available for Navy Cyber Work Force Personnel

October 6, 2016

Naval Information Forces has developed a website for the Navy Cyber IT and Cybersecurity Workforce (Cyber IT/CSWF) Qualification Program.

Hackers Love Your Small Business

October 5, 2016
By Julianne Simpson

Smaller businesses have become bigger targets for cyber attacks. Now more than ever, owners must quantify the risk and what could happen as a result of a successful cyber breach.

Confronting the Enemy at the Endpoint: Tips for Online Safety and Security

October 3, 2016
By Aubrey Merchant-Dest

October is National Cyber Security Awareness Month and the U.S. Department of Homeland Security hopes to use the month-long campaign to inform everyone—individuals, nonprofits, the military, private industries, educational institutions and governments—about cybersecurity.

Yahoo Warns 500 Million User Accounts Hacked by 'State-Sponsored Actor'

September 22, 2016

Yahoo Inc. released a statement Thursday informing customers that at least 500 million user accounts were stolen from its network in 2014 by what company officials labeled a "state-sponsored actor."

Financial Sector Offers Model for Cybersecurity Sharing

September 15, 2016
By J. Wayne Lloyd

When it comes to cybersecurity, many people express consternation and wonderment as to why the government cannot protect the Internet. It boils down to two things: No authorization, and officials only have visibility into a scant number of networks under their control.

DNI Warns of Continued Troubled Cyber Wars

September 7, 2016
By Sandra Jontz
Director of National Intelligence James Clapper speaks at the Intelligence & National Security Summit. Photo by Herman Farrer Photography

Cybersecurity will remain as much of a challenge for the next administration as it has been for the current White House, especially in light of the constant barrage of cyber attacks from nation states, Director of National Intelligence James Clapper said Wednesday at the Intelligence & National Security Summit.

It’s Back To Basics for Cybersecurity

August 30, 2016
By Robert B. Dix Jr.

The guidelines for improving cybersecurity on a national scale already are in place. Now, we need commitment on a national scale to implement them.

A Three-pronged Approach for Fighting Foreign Cyber Attacks

August 16, 2016
By Mav Turner

When we think of cyber attacks, we generally picture a lone wolf hacker or Anonymous-type organization. But foreign governments also are formidable threats. Take a moment to scan the headlines and you’ll see that articles about cyber hacks on Sony Pictures Entertainment and the Democratic National Committee—among many others—have been attributed to North Korea and Russia. Blogger Mav Turner from SolarWinds offers pointers on safeguarding networks from increasingly sophisticated intrusions.

Giving Back, One Cyber Scholarship at a Time

August 10, 2016
By Sandra Jontz
Nischit Vaidya (c), stands with his mother Mira Vaidya and father Niranjan Vaidya. Vaidya started a scholarship in his parents' names for cyber students at Capitol Technology University. Two students, a male and a female, will receive $1,000 each this fall. Photo courtesy Nischit Vaidya.

When students studying cybersecurity return to Capitol Technology University in Maryland this fall, cash scholarships donated by a former adjunct professor will aid at least two of them. Nischit Vaidya, CEO of Argotis, is driven by a love of education and a desire to give back to his community.

DeVries Named OPM's CIO

August 9, 2016
By Sandra Jontz

The Office of Personnel Management announced Tuesday it has appointed David DeVries as its new chief information officer. DeVries now leaves the Defense Department, where he serves as the department's principal deputy chief information officer under Terry Halvorsen.

Have Developers Become Overly Dependent on Dependencies?

August 8, 2016
By Marvin Marin

One often-overlooked aspect of software development is how much programmers rely on open source libraries and packages for prewritten functions. Using the method makes a new program dependent on the existence and availability of that particular module. If that dependency is not available or the code functionality is broken, the entire program fails.

When Hackers Corrupt GPS Data

August 3, 2016
By George I. Seffers
Corrupting GPS data can disrupt the power grid, says one expert at the AFCEA TechNet Augusta conference.

When a hacker talks about a novel way to disrupt the power grid, people listen. At least that was the case on day two of the AFCEA TechNet Augusta conference taking place in Augusta, Georgia.

Predicting the Cyber Future

August 3, 2016
By George I. Seffers

One of the biggest advances in the near future likely will be the convergence of major military networks into one unified Department of Defense Information Network (DODIN), predicts Ronald Pontius, deputy to the commanding general, U.S. Army Cyber Command and Second Army. And that network will be operated and maintained by Signal Corps soldiers.

Russia Employs Full Range of Information Warfare Capabilities

August 2, 2016
By George I. Seffers
Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence, speaks at TechNet Augusta on August 2, 2016.

The Russian Federation forces are using a wide array of cyber and electronic warfare capabilities unlike anything U.S. forces have faced in the past 16 years. Russia uses its sophisticated capabilities to detect, locate and eliminate enemy forces, according to Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence.

Researchers Develop Wireless Malware Detection Technique

August 1, 2016

The technique, known as Zero-Overhead Profiling, will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs.