It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department's IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency. The plan segments tasks into four key "lines of effort" to strengthen cybersecurity initiatives. Read on to learn what they are and if they'll work.
Do you play Pokemon Go? The craze surrounding the augmented reality game that blends modern technology with a hint of nostalgia has resulted in a lot of benefits, from getting people outdoors to striking up conversations with strangers. But security concerns cause the hair of cybersecurity experts and privacy practitioners to stand on end worse than Brock’s.
The U.S. Army is testing how cyberwarriors adjust to morphing cyber threats and electromagnetic warfare (EW) attacks during its Cyber Quest 2016, an exercise now underway at the Cyber Center of Excellence at Fort Gordon, Georgia. The event examines concepts and products that could influence future technologies and requirements as well as other Army and Defense Department exercises and experiments.
It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The rapid adoption of software defined network (SDN) concepts and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization, writes Bob Kimball, CTO for Ciena Government Solutions.
The world needs at least 1.5 million cybersecurity professionals who do not exist—a labor shortage created by the increase in frequency and severity of cyber attacks and employers all fishing from the same pond, said Michael Cameron, vice president for business development, cyber and cybersecurity at Leidos, during the NITEC 2016 cyber conference.
A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach.
By now, you've probably heard all about the so-termed Panama Papers, one of the largest data leaks in history with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?
Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.
The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems.
CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.
Let’s face it—we have a lot to learn about cybersecurity. Every day, we learn solutions have a short shelf life and that hackers have managed to stay a few steps ahead of those trying to track them down, shares RedSeal's CEO in a new blog.
Cyber information sharing needs to be targeted to organizational needs throughout government and industry. Certain private sector groups are doing just that with their own form of cyber situational awareness.
Thanks to the Internet of Things, just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.
The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to the DISA Global Operations Command to reflect the organization’s evolution as a global service provider.
Russia and China have built formidable military forces by focusing on perceived U.S. vulnerabilities, particularly in cyberspace.
Piling on complex network security measures actually may aid cyberthreats by preventing their early detection and isolation.
The rapidly evolving nature of cyberspace threats may force the military to change its approach to combating digital threats.
U.S. allies in Europe are pursuing similar approaches to cybersecurity. So why don't the two sides work together for a common solution that would provide greater empowerment in coalition operations?
The evolution of information technology is heading toward a hyperconverged infrastructure (HCI). Advantages of HCI include lowered management costs and less administrative overhead, and these systems already have made headway into the Defense Department and federal agencies.
Federal agencies clamor for industry best practices to implement findings resulting from last year's 30-day "Cybersecurity Sprint," part of the administration’s broader effort to bolster federal cybersecurity. A new mandatory directive for all civilian government agencies, the Cybersecurity Strategy Implementation Plan, provides a series of actions to further secure federal information systems.