Let’s face it—we have a lot to learn about cybersecurity. Every day, we learn solutions have a short shelf life and that hackers have managed to stay a few steps ahead of those trying to track them down, shares RedSeal's CEO in a new blog.
Cyber information sharing needs to be targeted to organizational needs throughout government and industry. Certain private sector groups are doing just that with their own form of cyber situational awareness.
Thanks to the Internet of Things, just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.
The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to the DISA Global Operations Command to reflect the organization’s evolution as a global service provider.
Russia and China have built formidable military forces by focusing on perceived U.S. vulnerabilities, particularly in cyberspace.
Piling on complex network security measures actually may aid cyberthreats by preventing their early detection and isolation.
The rapidly evolving nature of cyberspace threats may force the military to change its approach to combating digital threats.
U.S. allies in Europe are pursuing similar approaches to cybersecurity. So why don't the two sides work together for a common solution that would provide greater empowerment in coalition operations?
The evolution of information technology is heading toward a hyperconverged infrastructure (HCI). Advantages of HCI include lowered management costs and less administrative overhead, and these systems already have made headway into the Defense Department and federal agencies.
Federal agencies clamor for industry best practices to implement findings resulting from last year's 30-day "Cybersecurity Sprint," part of the administration’s broader effort to bolster federal cybersecurity. A new mandatory directive for all civilian government agencies, the Cybersecurity Strategy Implementation Plan, provides a series of actions to further secure federal information systems.
The National Institute of Standards and Technology has released the final version of a document outlining its process for developing cryptographic standards and guidelines.
As government agencies continue their IT modernization initiatives, administrators find themselves in precarious positions when it comes to security. A recent cybersecurity survey by SolarWinds found that efforts to build more modern, consolidated and secure information technology environment networks increase security challenges, but management tools offer a potential antidote to the threats.
When it comes to the Air Force's cyber protection teams, or CPTs as they are better known, officials are at the stage now where they're building the aircraft while flying it. It is all part of a growing effort to mature defensive cyberspace operations, and CPT members still are writing the playbook on how they define, map, prioritize and help defend key terrain.
While technology helped propel the U.S. military to outshine just about every adversary, failing to safeguard key developments just might lead to its downfall, warned Maj. Gen. Jerry Harris, USAF, vice commander of Air Combat Command at Langley Air Force Base in Virginia. At the vertex of much of technological advances has been emergence of cyberspace across warfighting domains.
Coming on the heels of Virginia's big push to reduce the number of commuters last week on area roads with Virginia Telework Week, the National Institute of Standards and Technology (NIST) is updating guidance to include the latest technology available to strengthen remote-access data security, especially as the number of teleworkers trends upward.
Pentagon officials launch the U.S. federal government's first cyber bug bounty program.
The increased attention now being paid to cybersecurity can spawn a cooperative atmosphere in which government, the private sector and the public all work together on vital measures. But will it?
The Navy has elevated information warfare to the same standing as other warfighting domains, and it is striving to incorporate it into as many elements in the fleet as possible.
Government and private sector experts drafted a national cyber response plan—more than six years ago. No action has been taken, and cybermarauders are not waiting for government to catch up.
Cyber attacks increasingly target the U.S. military and other federal departments, causing these agencies to rely on technology to accomplish their goals, which also increases the size of their attack surface. It’s a Catch-22, and staying one-step ahead of hackers trying to infiltrate an IT environment is challenging. It can be nearly impossible if those tasked with protecting that environment don’t have visibility across all of the systems and infrastructure components.