Cyber Blog

Four Strategies the DOD Can Implement to Increase Cybersecurity

July 19, 2016
By Joe Kim

It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department's IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency. The plan segments tasks into four key "lines of effort" to strengthen cybersecurity initiatives. Read on to learn what they are and if they'll work.

Does the Pokemon Go Craze Threaten Networks?

July 14, 2016
By Sandra Jontz

Do you play Pokemon Go? The craze surrounding the augmented reality game that blends modern technology with a hint of nostalgia has resulted in a lot of benefits, from getting people outdoors to striking up conversations with strangers. But security concerns cause the hair of cybersecurity experts and privacy practitioners to stand on end worse than Brock’s.

U.S. Army's Cyber Quest Underway in Georgia

July 14, 2016

The U.S. Army is testing how cyberwarriors adjust to morphing cyber threats and electromagnetic warfare (EW) attacks during its Cyber Quest 2016, an exercise now underway at the Cyber Center of Excellence at Fort Gordon, Georgia. The event examines concepts and products that could influence future technologies and requirements as well as other Army and Defense Department exercises and experiments.

The Virtual Cybersecurity Frontier

July 12, 2016
By Bob Kimball

It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The rapid adoption of software defined network (SDN) concepts and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization, writes Bob Kimball, CTO for Ciena Government Solutions.

Cyber Readiness Means First Building the Work Force

June 8, 2016
By Sandra Jontz

The world needs at least 1.5 million cybersecurity professionals who do not exist—a labor shortage created by the increase in frequency and severity of cyber attacks and employers all fishing from the same pond, said Michael Cameron, vice president for business development, cyber and cybersecurity at Leidos, during the NITEC 2016 cyber conference.

Government Framework Offers Cybersecurity

June 6, 2016
By Beverly Mowery Cooper

A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach.

Cyber Lessons From The Panama Papers Hack

May 23, 2016
By Max Emelianov

By now, you've probably heard all about the so-termed Panama Papers, one of the largest data leaks in history with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?

Making Innovation Relevant for Operational Success

May 19, 2016
By Beverly Mowery Cooper
Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

Viewing Cyber Data in 3-D

May 11, 2016
By George I. Seffers
LinQuest's cyber solution allows analysts to view data in 3-D.

The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems.

CyberFence Protects Critical Infrastructure

May 11, 2016
By George I. Seffers

CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.

6 Steps to Increase Cybersecurity in the Age of Innocence

May 10, 2016
By Ray Rothrock

Let’s face it—we have a lot to learn about cybersecurity. Every day, we learn solutions have a short shelf life and that hackers have managed to stay a few steps ahead of those trying to track them down, shares RedSeal's CEO in a new blog.

Situational Awareness Will Inform Risk Management Decision Making

May 5, 2016
By Robert B. Dix Jr.

Cyber information sharing needs to be targeted to organizational needs throughout government and industry. Certain private sector groups are doing just that with their own form of cyber situational awareness.

Connectivity Mayhem: Ensuring Data Security in an IoT World

May 2, 2016
By Joel Dolisy

Thanks to the Internet of Things, just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.

DISA Renames Field Command Organization

April 26, 2016

The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to the DISA Global Operations Command to reflect the organization’s evolution as a global service provider.

Potential Adversaries Target U.S. Military Vulnerabilities

April 22, 2016
By Robert K. Ackerman

Russia and China have built formidable military forces by focusing on perceived U.S. vulnerabilities, particularly in cyberspace.

Simpler May Be Better for Stopping Cybermarauders

April 22, 2016
By Robert K. Ackerman

Piling on complex network security measures actually may aid cyberthreats by preventing their early detection and isolation.

Military Needs to Increase Cyber Collaboration

April 22, 2016
By Robert K. Ackerman

The rapidly evolving nature of cyberspace threats may force the military to change its approach to combating digital threats.

U.S., Allies Need to Cooperate on Cybersecurity

April 21, 2016
By Robert K. Ackerman

U.S. allies in Europe are pursuing similar approaches to cybersecurity. So why don't the two sides work together for a common solution that would provide greater empowerment in coalition operations?

Want to realize the security benefits of hyperconverged systems? Look to FedRAMP

April 12, 2016
By Brian Fogg

The evolution of information technology is heading toward a hyperconverged infrastructure (HCI). Advantages of HCI include lowered management costs and less administrative overhead, and these systems already have made headway into the Defense Department and federal agencies.

Getting Federal Agencies Cyber Ready for CSIP

April 6, 2016
By J. Wayne Lloyd

Federal agencies clamor for industry best practices to implement findings resulting from last year's 30-day "Cybersecurity Sprint," part of the administration’s broader effort to bolster federal cybersecurity. A new mandatory directive for all civilian government agencies, the Cybersecurity Strategy Implementation Plan, provides a series of actions to further secure federal information systems.  

Pages