Cyber

July 5, 2022
By Diego Laje
Quantum computers offer the promise to solve complex problems current devices can’t achieve; nevertheless, they also pose a threat to cybersecurity. Credit: Shutterstock/Yurchanka Siarhei

Four algorithms designed to withstand attacks by powerful quantum computers were selected as future security standards.

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) chose encryption tools that will become part of the upcoming protocols to protect activities such asincluding online banking and email.

July 1, 2022
By George I. Seffers
Soldiers conduct preventive maintenance checks on an AH-64D Apache Longbow helicopter during training at the Grafenwoehr Training Area in Germany. Army photo by Spc. Nathanael Mercado

In the two years since the Army Software Factory launched, it has sent multiple applications into production. And those apps are being developed in large part by soldiers in nontechnical career paths, including combat engineers, medics and maintenance.

Army Futures Command launched the software factory in July 2020 to test the possibility of soldiers and Army civilian employees adopting commercial practices and building software solutions for the service. If the concept proves successful, it could demonstrate a more versatile model for building and fielding Army software while also preparing soldiers to operate on a highly technical and disconnected future battlefield.

July 1, 2022
By Veronica Wendt, Michelle Ann Guo and Dr. Anteneh Girma
Access control vulnerabilities for cloud, wireless and IoT include sensitive data exposure, missing function-level access control, weak encryption and lack of auditing to review physical/logical access. Shutterstock/Andrew Suslov

New capabilities and platforms, such as Internet of Things devices and cloud computing, require updated cybersecurity implementation strategies across different technologies and platforms. One approach is to examine multiple capabilities and platforms, identifying shared vulnerabilities and mitigation strategies. Benefits of this are three-fold: results can better inform an organization’s risk assessment, limited resources can be prioritized for higher risk vulnerabilities and overall complexity of security management can be reduced. One example of this strategy is to examine cloud computing, Internet of Things devices and Wi-Fi wireless networks to find shared vulnerabilities.

July 1, 2022
By Morgan Livingston
Operationalizing secure machine learning starts at the human level. Shutterstock/Gorodenkoff

The technical features of artificial intelligence introduce vulnerabilities and lend the technology to adversarial use. And securely deploying artificial intelligence depends on integration into existing organizational structures. Leveraging and securing machine learning requires a sociotechnical approach.

July 1, 2022
By Elie Alhajjar
Threat Tracker is an autonomous threat detection system developed by a small team of engineers and scientists within Naval Surface Warfare Center Panama City Division’s Coastal and Maritime Security branch. Integrated with an advanced unmanned surface vehicle, this system can provide a fully autonomous USV escort capable of detecting and stopping a wide variety of threats. (U.S. Navy graphic)

Imagine the following scenarios: An explosive device, an enemy fighter jet and a group of rebels are misidentified as a cardboard box, an eagle or a sheep herd. A lethal autonomous weapons system misidentifies friendly combat vehicles as enemy combat vehicles. Satellite images of a group of students in a schoolyard are misinterpreted as moving tanks. In any of these situations, the consequences of taking action are extremely frightening. This is the crux of the emerging field of adversarial machine learning.

July 1, 2022
 

Raj Iyer, Army chief information officer, advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.

What are your biggest accomplishments as Army CIO so far?

It was important to establish a vision and strategy for digital transformation across the Army, and we accomplished that through the Army Digital Transformation Strategy. The strategy was important to align Army priorities and achieve unity of efforts across the Army—strategic, operational and tactical, and across all three components—Active, Guard and Reserve.

June 27, 2022
By Kimberly Underwood
Cyber and national security experts are quite alarmed with the systemic cybersecurity vulnerabilities of Microsoft Corp’s products, the company’s dependence on China for product revenue and associated consolations to the Chinese government, as well as the U.S. government’s incredible reliance on the Microsoft products across its agencies. Credit: Shutterstock/The Art of Pics

SIGNAL Media is reaching out to Microsft Corp. for comment and this article will be updated accordingly.

June 24, 2022
By Nuray Taylor

A research team at vpnMentor recently reported a data breach in a Microsoft Azure cloud account belonging to the company Myeasydocs.  

Microsoft Azure, a cloud computing service for application management released nearly 13 years ago, prides itself on consistency, productivity and security. Myeasydocs, an India-based online platform company allowing users to submit documents for university, bank and many other important verification purposes, used Azure to store documents and data. The failure: zero implementation of any cybersecurity measures, thereby exposing up to 57,400 files of educational records and personally identifiable information (PII) data.  

June 21, 2022
By Kimberly Underwood
Eric Mill, a senior advisor to the federal chief information officer and one of the primary authors of the Office of Management and Budget’s zero trust policy, speaks with Matthew McFadden, vice president, cyber and distinguished technologist, General Dynamics Information Technology, at a Billington CyberSecurity event on June 16.

Issued back in late January, the M-22-09 memorandum from the Office of Management and Budget (OMB), entitled Moving the U.S. Government Toward Zero Trust Cybersecurity Principles and issued by OMB acting director Shalanda Young, required federal agencies to meet specific cybersecurity standards and objectives by the end of fiscal year 2024. Eric Mill, a senior advisor to Federal Chief Information Officer Clare Martorana, who helped draft the federal zero-trust architecture (ZTA) strategy, advised agencies to have a mix of “specific and very tangible” technical steps as well as some broader architectural changes.

June 13, 2022
By George I. Seffers
F-16 Fighting Falcons conduct aerial operations in the U.S. Central Command area of responsibility in May. In theory, a cyber attack on a military base wastewater treatment plant could prevent jets from providing air support during combat, experts say. Credit: Air Force Master Sgt. Matthew Plew

Converging operational systems with information systems provides an array of benefits but also allows increased opportunities for cyber adversaries. Among other remedies, two experts in the Defense Department and industry recommend zero-trust cybersecurity and training and education to cope with the increased threat.

Josh Brodbent, regional vice president for solutions engineering for the public sector, at BeyondTrust, and Lance Cleghorn, a digital services expert at Defense Digital Services (DDS), describe operational technology as systems that haven’t normally been connected to the Internet but are now becoming so at a rapid pace.

June 1, 2022
By Kimberly Underwood
Space Delta 2’s inaugural 19th Squadron in Dahlgren, Virginia, will be performing cislunar domain awareness, a key new mission to surveil and identify both friendly and adversarial activity in the space beyond the geosynchronous orbit. NASA illustration of its CAPSTONE mission that involves a microwave oven-sized CubeSat flying in cislunar space, the orbital space near and around the moon.  Illustration by Daniel Rutter, NASA

With the growing number of satellite constellations comes an increasing amount of congestion in space, in addition to existing space assets and debris. But beyond the need to identify and manage space congestion is a role not quite as needed before—that of space defense. The ability to protect assets in space from adversaries is critical to the U.S. military and allies, and it starts with adroit space domain awareness. The operators of the U.S. Space Force’s Space Delta 2 aim to provide this crucial function.

June 1, 2022
By George I. Seffers
A Rydberg receiver and spectrum analyzer detect a wide range of real-world radio frequency signals above a microwave circuit, including AM radio, FM radio, Wi-Fi and Bluetooth.  U.S. Army illustration

U.S. Army researchers are developing a quantum sensor capable of detecting electromagnetic emissions across frequency bands and at far greater ranges than traditional receivers and are considering demonstrating the capability with soldiers later this year.

The technologists at the Army’s Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center envision a shoebox-sized device capable of detecting signals across bands such as long band, short band and conventional band, which are often shortened to L-, S- and C-bands. The device might also pick up signals at far greater distances.

June 1, 2022
By George I. Seffers
After overhauling cyber training and achieving unusually high rates for students passing the National Security Agency’s cyber training, the Air Force’s 39th Information Operations Squadron shares lessons learned with others.  U.S. Air Force photo by J.M. Eddins Jr.

Passing the National Security Agency’s comprehensive cybersecurity training is no easy feat, but the Air Force’s 39th Information Operations Squadron has achieved unusually high success rates in getting students through the programs.

May 1, 2022
By Robert K. Ackerman
Two U.S. Army special forces soldiers conduct radio checks during Exercise Combined Resolve in December, which included special operations forces from Ukraine. The U.S. Special Operations Command is pursuing multiple approaches to establish communications links with special forces and partner nations, and these approaches may become part of conventional force operations.  U.S. Army photo

The U.S. Special Operations Command is developing an information technology architecture and operational plan that eventually may evolve into a template for overall U.S. Defense Department military operations. Many of the needs expressed by special operations forces are not unlike those experienced by elements of conventional service forces, and successful development and deployment of special operations digital systems can have a direct bearing on departmentwide military systems.

May 11, 2022
By George I. Seffers
Cyber educators highly encourage those who have previously worked or are currently working in cybersecurity to teach part time. Shutterstock/4LUCK

A panel of cyber educators today encouraged subject matter experts in the military and industry to teach cybersecurity part time.

The panel enthusiastically embraced the suggestion from an audience member at the AFCEA Cyber Education Research and Training Symposium on May 11 in Augusta, Georgia.

May 10, 2022
By George I. Seffers
Brig. Gen. Paul Craft, USA, commandant, U.S. Army Cyber School, speaks on a panel at CERTS 2022. Photo by Michael Carpenter

The U.S. Army in the past 30 days kicked off 10 Junior Reserve Officers’ Training Corps focused specifically on students interested in cyber careers. The service also has offered the first direct commission to a lieutenant colonel in the cyber realm and will soon do the same for a full colonel.

Brig. Gen. Paul Craft, USA, commandant, U.S. Army Cyber School, told the audience at the AFCEA Cyber Education Research and Training Symposium (CERTS) in Augusta, Georgia, that the new Junior ROTC efforts are important for the Army and for the nation. “That’s a big thing for the U.S. We now have multiple focused Cyber Junior ROTC programs in our nation, and they will expand over time.”

May 10, 2022
By George I. Seffers
David Frederick Jr., executive director at U.S. Cyber Command, addresses the audience at CERTS 2022. Photo by Michael Carpenter

Earlier this year, U.S. Cyber Command and the cyber components of each of the military services initiated an academic engagement network to reach out to students interested in potentially supporting military cyber missions. In the coming months, Cyber Command will invite network members to help solve hard problems in the cyber arena, including technical, policy and strategy challenges.

May 9, 2022
By George I. Seffers
Brig. Gen. Paul Stanton, commander, U.S. Army Cyber Center of Excellence, speaks at CERTS 2022. Photo by Michael Carpenter

The United States needs to add computer skills to elementary education, and the military needs to broaden its cyber training. That was the gist of the message from Brig. Gen. Paul Stanton, USA, commander, U.S. Army Cyber Center of Excellence, during his opening remarks on the first day of the AFCEA Cyber Education, Research and Training Symposium (CERTS), May 9, in Augusta, Georgia.

May 09, 2022
By George I. Seffers
Joyce Corell, senior technical advisor to the national cyber director, addresses the audience at CERTS 2022. Photo by Michael Carpenter

The Office of the National Cyber Director (ONCD) is planning a cyber workforce development summit that could take place as early as June, and it could be accompanied by a White House strategy on cyber workforce development, reports Joyce Corell, senior technical advisor to the national cyber director.

The ONCD was formed on January 1 of last year under the National Defense Authorization Act for Fiscal Year 2021. It was initially recommended by the Cyberspace Solarium Commission, a panel authorized by Congress.

ONCD officials are working with the secretaries of labor, education and homeland security as well as congressional offices and other “government stakeholders” on the workforce development summit, Corell reported.

April 28, 2022
By Kimberly Underwood
The extent of global cyber attacks in 2021 reached a level, complexity and sophistication not seen before, experts say. Credit: Shutterstock/supimol kumying

Cybersecurity officials from Australia, Canada, New Zealand, the United Kingdom and the United States issued an advisory April 27 disclosing the most common digital vulnerabilities and exposures routinely leveraged by cyber attackers in 2021. Of the top 15 software vulnerabilities identified across all of the countries, Microsoft products accounted for nine such issues.

The United States’ Cybersecurity and Infrastructure Security Agency, National Security Agency and FBI collaborated with the Australian Cyber Security Centre, Canadian Centre for Cyber Security, New Zealand National Cyber Security Centre and United Kingdom’s National Cyber Security Centre to issue the advisory.

May 1, 2022
By Kimberly Underwood
With Internet of Behaviors approaches being used more and more to influence human behavior, adding in explainable artificial intelligence platforms can aid humans’ understanding. Shutterstock/Zentangle

The application of explainable artificial intelligence to Internet of Behavior techniques may help provide a more trusted and understandable framework in changing human behaviors, researchers say. This combination of Internet of Things devices, artificial intelligence, data analytics and behavioral science can also achieve user and business benefits, according to a study.

May 1, 2022
By Robert K. Ackerman
While Russia has a strong community of private sector hackers willing to engage in global cyber attacks for their nation, the United States also has its own patriotic hackers who can engage in their own form of wreaking digital havoc in Russia—possibly in coordination with U.S. government efforts.  Alexander Geiger/Shutterstock

Russia’s well-known cyber attacks on Western nations could be setting the country up for a powerful backlash, offers a retired U.S. Army expert formerly based in Moscow. After years of relentless penetrations and attacks on databases and infrastructure in U.S. and NATO countries, Russia now is finding itself as much—if not more—of a target of reciprocal cyber assault capabilities increasingly wielded by the West.

May 2, 2022
 
Identity verification and credentials are key tools in protecting networks and their valuable data from breaches and compromise. Credit: PopTika/Shutterstock

Who you are, or more importantly, who your IT network thinks you are and what it allows you to do, is a crucial part of cybersecurity.

One’s identity in cyberspace is key to accessing its resources, and it is part of an ongoing battle between security teams and criminal and nation state-backed hackers trying to get in, explains Christian Lees, chief technology officer, Resecurity Inc.

Identifying an identity-based threat not only helps individuals, but entire organizations as well. “If we can help fast track the detection of a threat, that’s our role,” Lees told SIGNAL Magazine Senior Editor Kimberly Underwood in an SIGNAL Media Executive Video discussion.

April 26, 2022
By Kimberly Underwood
With an estimated 400,000 unfilled cyber jobs in the United States, the Cybersecurity and Infrastructure Security Agency started several initiatives to grow the cyber professional workforce, reports David Mussington, executive assistant director for Infrastructure Security at the agency, speaking at AFCEA’s TechNet Cyber 2022 conference.

The U.S. government agency known as CISA, charged with helping the country manage and reduce the risks of cyber threats to digital and physical infrastructure, is pursuing several efforts to add cyber professionals to the workforce. Experts say there are almost 2.7 million unstaffed cyber positions globally, with almost 400,000 unfilled cyber jobs in the United States, according to a recent (ISC)² Cybersecurity Workforce Study. This year, CISA—the Cybersecurity and Infrastructure Security Agency—started several initiatives to grow the cyber professional workforce, reported David Mussington, executive assistant director for Infrastructure Security at the agency.

January 1, 2022
By George I. Seffers
A team leader with 1st Battalion, 504th Parachute Infantry Regiment, directs movements of his team using the Harris Leader Radio during an assault on an objective during the initial operating test for the system. The rapid development and fielding of cutting-edge systems help drive the need for agility and adaptability at Army signal and cyber schools.  Nicholas Robertson, U.S. Army Operational Test Command Visual Information Specialist

The U.S. Army’s massive modernization effort requires rapid adaptability in the courses being taught in its cyber and signal schools. Efforts are underway to fundamentally change the approach to teaching and instituting courses for zero trust, cloud computing and other technology advances that will affect the future of combat.

May 2, 2022
By John Greenstein, General Manager of Public Sector, Bluescape

While improved service delivery and return on investment are top-of-mind procurement objectives when choosing a Software as a Service (SaaS) partner, federal agencies must equally prioritize “security first” measures to ensure vulnerable legacy systems are protected in today’s digitally dominated climate.

May 1, 2022
By Kimberly Underwood
Adversaries such as China are employing Internet of Behaviors approaches on a wider scale.  Shutterstock/Hugethank

The confluence of advanced digital tools, such as computer vision, along with Internet of Things devices, data science and knowledge of human nature, is enabling the greater ability to track, analyze and prompt human behavior. The use of this approach, referred to as Internet of Behaviors, is expected to skyrocket, with an estimated 40 percent of the global population’s activities by 2023 thought to be tracked digitally to influence behavior, according to Stamford, Connecticut, research firm Gartner.

May 1, 2022
By Kimberly Underwood
Intelligence community leaders, including (l-r) FBI Director Christopher Wray; Gen. Paul Nakasone, USA, director, National Security Agency and commander, U.S. Cyber Command; Avril Haines, director of National Intelligence, Office of the Director of National Intelligence; CIA Director William Burns; and Gen. Scott Berrier, USA, director, Defense Intelligence Agency, testify before Congress in March about lessons learned from Russia’s invasion of Ukraine.  Senate Select Committee on Intelligence

February’s invasion of Ukraine by Vladimir Putin was a shock to geopolitical order. NATO and the United States acted quickly to aid Ukraine while avoiding entering a war against Russia and shoring up any threat to NATO and the United States. From their early observations of the war, U.S. officials from Congress, and the cyber and intelligence communities are looking closely to glean understanding and apply key knowledge to U.S. actions and defenses.

May 1, 2022
By Lt. Gen. Susan S. Lawrence, USA (Ret.)

An evolving trend, the Internet of Behaviors, requires our attention. This growing field in the digital realm stems from the Internet of Things, the earlier wave of connected devices to the Internet and people, which also came with certain vulnerabilities. Not much has been published yet about Internet of Behaviors to help further guide our policies and actions. And with Internet of Behaviors presenting both positive and negative potential impacts, I would like to start a greater dialogue about it.

May 1, 2022
 
Credit: NDanko/Shutterstock

As the National Security Agency’s (NSA’s) cybersecurity director, Rob Joyce oversees the agency’s Cybersecurity Directorate, which was established to prevent and eradicate cyber threats to the Defense Department, national security systems and the defense industrial base. He has served in both the cybersecurity and signals intelligence missions at NSA since 1989 and worked as the cybersecurity coordinator and acting homeland security advisor at the White House.

What would you say are your—or your team’s—greatest achievements since you started this job?

April 28, 2022
By Kimberly Underwood
Maj. Gen. Kevin Kennedy, USAF, director of operations, U.S. Cyber Command, discusses the Joint Cyber Warfighting Architecture during a keynote presentation at TechNet Cyber 2022. Photo by Michael Carpenter

One of the priorities that the U.S. Cyber Command is pursuing this year is defining and advancing the Joint Cyber Warfighting Architecture, which is designed to leverage data and cyber intelligence to provide situational awareness and battle management at strategic, operational and tactical cyber mission levels. The construct also includes an array of defensive and offensive cyber capabilities that need to be advanced and will help identify any capability gaps, thereby guiding cyber warfare capability acquisition.

April 26, 2022
By George I. Seffers
Recent lessons learned from the Defense Information Systems Agency's Thunderdome program include the need to move more quickly to implement zero trust on the Defense Department's classified network known as SIPRNet. Credit: ArtemisDiana/Shutterstock

The U.S. Defense Information Systems Agency (DISA) intends to double down on the security of its classified networks in the coming months as it experiments with the zero-trust prototype known as Thunderdome.

Julian Breyer, DISA’s senior enterprise and security architect, reported a change in priorities while discussing Thunderdome during a panel session at AFCEA’s TechNet Cyber conference in Baltimore, April 26.

April 26, 2022
By Nuray Taylor
Credit: enzozo/Shutterstock

By the end of 2022, leaders at the Defense Information Systems Agency (DISA) anticipate having a production decision as part of its zero-trust prototype officials call Thunderdome, Brian Hermann, director of the agency’s Cyber Security and Analytics Directorate, said during a micro-keynote session Tuesday during AFCEA’s annual TechNet Cyber conference, taking place April 26-28 in Baltimore. 

April 26, 2022
By Kimberly Underwood
Army Deputy Chief of Staff G-6 Lt. Gen. John Morrison, USA, shown at the Pentagon, was a keynote speaker at TechNet Cyber 2022.

The Army’s Unified Network, which will enable the service to deliver the strategic, operational and tactical effects that maneuver commanders need across joint and coalition operations, is advancing, said Lt. Gen. John Morrison, USA, deputy chief of staff and the Army G-6, speaking at AFCEA’s TechNet Cyber conference in Baltimore on April 26.

April 26, 2022
By Robert K. Ackerman
Panelists discussing spectrum challenges at TechNet Cyber 2022 are (l-r) Christopher Argo, Defense Spectrum Organization; Brig. Gen. Darrin Leleux, USAF; Vernita Harris, DISA; David Tremper, Office of the Assistant Secretary of Defense for Acquisition; and Brian Hermann, DISA.  Photo by Michael Carpenter

The electromagnetic spectrum may be the key to prevailing in cyberspace during a conflict, and many of the requisites that apply to other domains also are vital in that realm. Foremost among these is situational awareness, as forces may not be able to win the spectrum battle without effective understanding of its conditions in real time.

The importance of spectrum was discussed by a theater session panel at TechNet Cyber 2022, being held in Baltimore April 26-28. The three-day event offered a heavy representation from the Defense Information Systems Agency (DISA), and two of the five panelists discussion spectrum challenges were from the agency.

April 14, 2022
By Shaun Waterman
Caroline Kuharske, DISA’s recently appointed acting chief data officer, discusses the five "untapped efficiencies" that DISA must employ for an effective information environment during AFCEA International's April 13 webinar.

As part of its planned transformation into a data-centric enterprise, the Defense Information Systems Agency will leverage telemetry and other data collected from endpoints to improve user experience, DISA officials said during an AFCEA International webinar.

April 13, 2022
By Robert K. Ackerman
Rear Adm. Peter W. Gautier, USCG, deputy commander, U.S. Coast Guard Pacific Area, discusses the roles the Coast Guard has taken on in the Indo-Pacific region. Credit: Dave Livingston photo

The U.S. Coast Guard is taking its place alongside the other national security services in cyberspace as it deals with a new mission menu. Its traditional taskings for search and rescue have expanded in scope and complexity, and it also is assuming new operations in an increasingly challenging maritime environment.

April 12, 2022
By Will Nelson
Lessons learned from the monarchs of history offer four modalities for coping with Russian cyber aggression. Credit: Shutterstock

Starting from the first recorded raid on the monastery of Lindisfarne in 793, Viking raids presented European rulers with an unprecedented challenge. Fast, sleek longships could stealthily deploy alongside the coasts of early medieval England and France, striking at wealthy, isolated targets and departing before local authorities could mount a response.

April 1, 2022
By George I. Seffers
The U.S. Air Force’s 39th Information Operations Squadron is expanding its courses to meet increased demand for expertise in the information realm.  Credit: DeymosHR/Shutterstock

With information operations (IO) in the world stage spotlight, the U.S. Air Force sees a growing need for experts in the field and is taking steps to expand training opportunities with the 39th Information Operations Squadron (IOS).

The 39th IOS, located at Hurlburt Field, Florida, trains Air Force personnel in information and cyber operations, including both offensive and defensive cyber skills. The unit conducts qualification and advanced training to provide mission-ready information and cyber warfare operators for all Air Force major commands.

April 8, 2022
DISA's Chief Data Officer Takes Charge
The Defense Information Systems Agency’s new office to handle data is striving to advance the agency’s and warfighters’ data-driven capabilities, says Acting Chief Data Officer Caroline Kuharske. Credit: DISA photo with Chris D’Elia graphics

With the creation of its first Chief Data Office, the U.S. Defense Information Systems Agency is stepping into a more data-centric vision. The need for enhanced data management, technologies and policies is necessary to support greater ventures of agency operations and improved decision making and operability for warfighters, explained Caroline Kuharske, acting chief data officer, Defense Information Systems Agency.

April 7, 2022
Maryann Lawlor
To meet its mission partners’ needs, the Defense Information Systems Agency facilitates access to an abundance of technical capabilities that prepare U.S. Defense Department personnel to face current and future challenges. Credit: U.S. Air Force Graphic Illustration/Quinn Jacobson

From the back office to the front lines, technical tools the Defense Information Systems Agency is exploring will facilitate military-industry communications and collaboration.

By enhancing the U.S. Department-industry relationship, future capabilities will expand how cloud technologies are deployed and employed and will improve warfighter readiness, bringing the latest tactics for open communications to mission owners.

April 1, 2022
By Robert K. Ackerman
NATO’s Deputy Secretary General Mircea Geoana, along with a group of alliance ambassadors, visits the NATO Alliance Ground Surveillance Force in Sigonella. The U.S. Defense Information Systems Agency (DISA) is working with its NATO allies to improve communications across the breadth of alliance activities and systems.  NATO

The battle for cyberspace may hinge on outer space as experts expand the digital frontier. The leading U.S. military communications organization is working with partners in NATO to exploit and dominate space communication systems with an eye to hurling defense systems into an advanced technology future.

April 1, 2022
By Paul Beckman
Extended detection and response (XDR)offers critical collective monitoring of identity management, intrusion sensors, firewall and cloud applications. PopTika/Shutterstock

In today’s cyber environment, the attack surface grows exponentially day after day with no sign of slowing. With the near-geometric growth of applications, the signal-to-noise ratio has been amplified into the stratosphere. The result: The hunt for timely and important context in system and network telemetry is like trying to find a particular needle in a sea of needles.

Equally challenging is the “dwell time” of attacks—the period between initial penetration and the point of detection/eradication. In 2020, the average global dwell time was 56 days. That means that an attacker had nearly two months inside a network on average before being discovered.  

April 1, 2022
By Kirk Nilsson
MPE must support rapid decision making from the strategic to tactical level. At the cutting edge of coalition operations, a Green Beret with the U.S. Army’s 1st Special Forces Group (Airborne) clears a room alongside Royal Thai Army soldiers during Cobra Gold 21.  Courtesy Photo, 1st Special Forces Group (Airborne)

Today, more than ever, combatant commands, joint task forces, service components and supporting agencies need the mission partner environment to deliver the same capabilities envisioned for the U.S. Defense Department’s Joint All-Domain Command and Control concept. With two near-peer competitors dominating the defense strategy, the need for an enterprise-level mission partner environment has never been greater for promoting security cooperation while maintaining military readiness. As Cliff Fegert, former director of the Mission Partner Capabilities Office noted, “With two near peers, we do not have the luxury of preparation time, and we must have allies/partners to deter or win.”

April 1, 2022
By George I. Seffers
The Defense Information Systems Agency created teams with representatives from across the agency to help define its zero trust-solution known as Thunderdome. By enhancing interagency communication and operation, the approach may change the way DISA does business.  Tartila/Shutterstock

Thunderdome, the Defense Information Systems Agency’s zero-trust solution, may enhance cybersecurity while also transforming the way the agency does business.

April 1, 2022
By Maj. Brian Kerg, USMC

The history of air power theory and practice offers considerations for those preparing to defend against cyber warfare. Most early air power advocates emphasized strategic bombing and its potential to quickly compel an enemy to sue for peace.

Gen. Curtis LeMay, U.S. Army Air Corps, who oversaw the shift to strategic bombing, said following World War II, “I suppose if I had lost the war, I would have been tried as a war criminal.”

March 31, 2022
By Maryann Lawlor
U.S. Army leaders detail the capabilities of the Joint Task Force-Civil Support common operating picture during a Joint All-Domain Command and Control System demonstration. The system synergizes multiple data feeds through real-time end-user reporting and collaborative planning. Photo Courtesy of the Defense Department

Leaders of the agency serving the services’ technology needs aims to balance cybersecurity and ease of use. Development of current and future capabilities focus on simplifying access as well as facilitating data and network protection.

As a lead up to Technet Cyber 2022, key Defense Information Systems Agency (DISA) directors are sharing their insights during weekly webinars to preview their priorities for attendees and exhibitors alike. The conference takes place next month in Baltimore.

March 28, 2022
By Shaun Waterman
The recently passed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires critical infrastructure operators to swiftly report substantial cyber incidents. Credit: Andrea Izzotti/Shutterstock

There’s a wind of change blowing through federal cybersecurity policy. The new SEC proposal for mandatory disclosure of cybersecurity incidents by publicly traded companies is one straw in that wind. The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) is another. But it’s a pretty hefty straw.

March 25, 2022
By Kimberly Underwood
U.S. Cyber Command Cyber National Mission Force members participate in a training and readiness exercise at Fort George Meade, Maryland, in September 2021. The CNMF plans, directs and synchronizes full-spectrum cyberspace operations to disrupt, degrade and defeat malicious cyber actors. Cyber warriors have played a considerable role in supporting the cyber defense of Ukraine, says Sen. Jack Reed, D-Rhode Island, head of the Senate Armed Service Committee. Credit: Photo by Aiyana Paschal

The United States and other NATO nations have been very careful not to go to war against Russia following Putin’s invasion of Ukraine. The nations, however, have moved to arm Ukraine, along with providing financial support and humanitarian assistance, and setting considerable sanctions against Russia. The U.S. Senate’s top military budget leader sees these steps as an initial success and identifies lessons learned or to be learned from observing the war, as well as several priorities.

March 23, 2022
Henry S. Kenyon

In times of global crises such as the COVID-19 pandemic and the war in Ukraine, the Defense Information Systems Agency (DISA) is working to make sure the U.S. Defense Department’s communications networks are running securely to provide leaders and warfighters with the information they need.

A key aspect of this is velocity of action, using innovation and initiative to gain an advantage over adversaries, DISA officials told SIGNAL Magazine Editor in Chief Robert Ackerman during the first of a series of TechNet Cyber 2022 webinars.