As government agencies continue their IT modernization initiatives, administrators find themselves in precarious positions when it comes to security. A recent cybersecurity survey by SolarWinds found that efforts to build more modern, consolidated and secure information technology environment networks increase security challenges, but management tools offer a potential antidote to the threats.
When it comes to the Air Force's cyber protection teams, or CPTs as they are better known, officials are at the stage now where they're building the aircraft while flying it. It is all part of a growing effort to mature defensive cyberspace operations, and CPT members still are writing the playbook on how they define, map, prioritize and help defend key terrain.
While technology helped propel the U.S. military to outshine just about every adversary, failing to safeguard key developments just might lead to its downfall, warned Maj. Gen. Jerry Harris, USAF, vice commander of Air Combat Command at Langley Air Force Base in Virginia. At the vertex of much of technological advances has been emergence of cyberspace across warfighting domains.
Coming on the heels of Virginia's big push to reduce the number of commuters last week on area roads with Virginia Telework Week, the National Institute of Standards and Technology (NIST) is updating guidance to include the latest technology available to strengthen remote-access data security, especially as the number of teleworkers trends upward.
Pentagon officials launch the U.S. federal government's first cyber bug bounty program.
The increased attention now being paid to cybersecurity can spawn a cooperative atmosphere in which government, the private sector and the public all work together on vital measures. But will it?
The Navy has elevated information warfare to the same standing as other warfighting domains, and it is striving to incorporate it into as many elements in the fleet as possible.
Government and private sector experts drafted a national cyber response plan—more than six years ago. No action has been taken, and cybermarauders are not waiting for government to catch up.
Cyber attacks increasingly target the U.S. military and other federal departments, causing these agencies to rely on technology to accomplish their goals, which also increases the size of their attack surface. It’s a Catch-22, and staying one-step ahead of hackers trying to infiltrate an IT environment is challenging. It can be nearly impossible if those tasked with protecting that environment don’t have visibility across all of the systems and infrastructure components.
Blogger J. Wayne Lloyd is a deer hunter, and the sport can be much like cyber hunting, the methodology organizations use when traditional security solutions fail to keep out intruders. Here's how to prepare for an effective hunt for cyber trespassers.
Previous attempts at developing a national cyber incident response plan have petered out. Now, with the threat greater than ever, government and industry must come together to draft a plan that addresses the myriad issues confronting cyber defense.
Following the distressing headlines that cataloged repeated cyber breaches of U.S. federal computer networks—some that compromised the personal data of millions of people—government officials have implemented a patchwork of safeguards to shore up vulnerabilities, including the identification of high value assets. An OMB memo gives agencies a multi-step plan, but it might not go far enough.
Hazards abound in safeguarding cyberspace, including the defense acquisition process. But some sacred cows may have to be slaughtered to help protect the defense network environment.
The ubiquity of networked devices has opened up a host of new opportunities for hackers aiming at targets from medical records to automobile GPS systems.
Having proper cyber hygiene is helping close the gap between security measures and hacker activities, but new threats continue to emerge.
Cybersecurity awareness is too important to be left to just one month of enhanced attention. Government, industry and nongovernmental organizations all can engage in just a few specific steps that would enhance cybersecurity significantly.
Small businesses doing work for the U.S. Defense Department pose serious cybersecurity concerns, in part because of their limited resources to invest in technical and practiced security measures, the U.S. Government Accountability Office stated in a recent report about small businesses cyber practices.
Government not only has been lax in following its own cybersecurity standards but also has failed to set the right example for the public sector and provide the proper resources to enable broad-based cyber protection.
The Office of Small Business Programs acknowledges that cybersecurity is an important and timely issue for small businesses and is considering incorporating cybersecurity into its existing outreach and education efforts
The presidents of the United States and China reach a historic agreement aimed at limiting cyber crime.