Cyber

February 27, 2013
By George I. Seffers

Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.

January 30, 2013
 

The Air Force Space Command expects to be directed to add 1,000 new people, mainly civilians, to its base of about 6,000 cyber professionals for the 2014 fiscal year. According to the U.S. Defense Department blog “Armed With Science,” Gen. William L. Shelton, USAF, who leads Air Force Space Command, said direction for the hires would come from the Office of the Secretary of Defense, fueled by the U.S. Cyber Command.

November 21 ,2012
By Maryann Lawlor

The (ISC)2 Foundation’s information security 2013 scholarship program application process will open on January 1, 2013, and it offers a total of $120,000 in awards to women, graduate students, young professionals and faculty. The foundation will award up to two scholarships totaling $40,000 to women pursuing an education in information security. In addition, it will give seed funding for up to eight grants of $3,000 each to assist graduate students conducting special research. One of the foundation’s other undergraduate scholarship winners will receive the Harold F.

November 8, 2012
By Rita Boland

The U.S. Department of State is hosting its first-ever Youth TechCamp in the Pacific region later this month. Coordinated in conjunction with Pasifika Nexus and the University of the South Pacific, Youth TechCamp Fiji will offer six days of training to as many as 300 youths from various Pacific islands. Local and international technology experts from the fields of digital content creation, mobile applications and social activism will participate as well. Organizers aim to enable future leaders from the region to contribute to policy development, encourage local content creation and leverage connection technologies in positive ways.

March 16, 2012
By Beverly Schaeffer

Although fiscal year 2015 is the target time frame for full operational capability, personnel from the U.S. Army's 780th Military Intelligence Brigade--the service's first-ever cyber brigade--already are helping to secure the Defense Department's networks against cyber attacks. While the unit was officially activated on December 1, prep work for the group has been ongoing since at least 1998, according to Technology Editor George I. Seffers in his article, "Historic Cyber Unit Begins Daily Action," in this issue of SIGNAL Magazine. Seffers speaks with Col.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president unveiled details Tuesday for new laws toward better cybersecurity, which include a heavy focus on increased information sharing between government and industry. Some experts have said cybersecurity lacks a robust information-sharing plan between the private sector and government and the related safeguards to protect companies that share from prosecution. It's a good start, but not quite enough, some experts say.

January 9, 2015
By George I. Seffers

Researchers at the Georgia Institute of Technology are investigating so-called side channel signals, low-level emissions from a computer that could allow savvy cyber attackers to illegally access information. By learning more about the signals, researchers may be one day be able to help mitigate the threat.

The Georgia Tech team has developed an algorithm for measuring the strength of the leaks, which will help prioritize security efforts. They now are studying smartphone emissions, which they say may be even more vulnerable. So far, they have looked only at Android devices.  

January 1, 2015
By Lt. Col. William A. Barnes, USMC

While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change. With a series of government actions, the nation can simultaneously address the increasing sophistication of cyberthreats and impediments to public-private information sharing.

January 1, 2015
By Sandra Jontz

The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.

The perpetual quest for convenience and expedience brought about technology that has connected billions of devices that produce and share vast amounts of information, from an infant’s sleeping habits to space mission data. What happens to the data, how it is managed, by whom and with whom, and how it might be safeguarded pose privacy and safety concerns for security experts and government officials.

January 1, 2015
By George I. Seffers
The U.S. Navy program executive office that supports the V-22 and myriad other aircraft is learning to cope with the cyber vulnerabilities of its networked platforms.

For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.

November 18, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

December 1, 2014
By Rita Boland

The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.

Run by the Office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology, or ASA(ALT), its efforts will not duplicate work done by the Chief Information Officer (CIO)/G-6—which is a key stakeholder that is establishing some guidelines—but rather take on new cybersecurity and information assurance responsibilities. Personnel in the focal will coordinate activities among various stakeholders in the Army cyber community, improving communications while making work more efficient.

December 1, 2014
By Sandra Jontz

The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.

While federal efforts abound, they are coordinated haphazardly, with gaps and no overarching governance—in spite of a preponderance of existing documents, plans, regulations and actions, according to experts.

December 1, 2014
By Rita Boland
A tactical operations center monitors an NIE. Securing cyber capabilities, starting in the laboratory then extending to the field, is a priority for the U.S. Army.

Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality. The service branch is introducing new digital features to the training event from the laboratory to the field.

December 1, 2014
By George I. Seffers
 Adm. Michael Rogers, USN, NSA director and commander, U.S. Cyber Command, predicts an attempted destructive attack affecting critical infrastructure networks during his tenure as commander.

Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.

November 3, 2014
By George I. Seffers

The U.S. Navy’s Task Force Cyber Awakening, which was established in July, is expected to deliver its first report to the service’s leadership this month, task force officials say. The report will include recommendations for improving the service’s cyber posture, both ashore and afloat.

December 1, 2014
By George I. Seffers

The U.S. Defense Information Systems Agency is being tasked with an operational role in the cyber domain, namely network defense. The new role creates a formal relationship between the agency, U.S. Cyber Command and the military services; integrates network operations and defense; and should ultimately improve security.

October 29, 2014
George I. Seffers

Terry Halvorsen, the Defense Department’s acting chief information officer, is expected very soon to release a new policy revising the role the Defense Information Systems Agency (DISA) plays in brokering cloud services. The changes are designed to speed cloud service acquisitions by preventing bottlenecks created by having only one agency act as broker. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.

October 16, 2014
By Sandra Jontz

Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.

Pages