The report on the power transmission system was delayed by government officials for security reasons.
U.S. Air Force Cyber Summit raises leadership awareness on service’s roles and responsibilities.
A few staff experts can formulate new strategies in a short time. Over the years, the U.S. Defense Department has accumulated a large collection of long-range planning documents. However, none of the plans ever was fully implemented, as new administrations kept changing priorities.
The just announced Defense Department Cloud Computing Strategy presents a long list of radically new directions. Ultimately, it will take hundreds of thousands of person-years to accomplish what has been just outlined. Several points stand out.
The next great threat to computer and network security lies in the supply chain—and it is here now. From factories unwittingly turning out devices infected with malware, to counterfeit parts sold on the Internet, malevolent operators threaten the security of information systems without running any risk of being stopped or detected by conventional security practices.
Marcus H. Sachs, vice president, national security policy for Verizon, told the audience at TechNet Asia-Pacific 2012 in Honolulu, Hawaii, that 10 to 12 percent of the global information technology supply chain is counterfeit, and that number is growing.
Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.
A premier cyber center and the next phase of the Joint Information Environment are altering the technical landscape for U.S. forces.
Cybersecurity remains the foremost concern for the man tasked with overseeing U.S. military communications technology in the Asia-Pacific area as the national defense strategy shifts focus to that region of the globe. New opportunities for technologies and programs are opening, but cyber issues continue to hold top billings in importance, and moves to shore up operations predate the recent official guidance.
The final conference in the TechNet Land Forces series focuses on military efforts to defend vital computer networks.
A new computing architecture emphasizes shared resources.
The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.
The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.
The National Intelligence University, which provides advanced training to U.S. intelligence professionals, is transitioning from an institution primarily focused on the U.S. Defense Department to one serving the entire intelligence community. This reflects the new emphasis toward sharing and collaboration within the nation's intelligence apparatus.
Defense customers are driving change; this effort tries to map the future.
The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.
|An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals. The Afghans traveled to Turkey as part of a NATO program to improve cyberdefense in their home country.|
|A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.|
|Patrick Grother is a computer scientist with the NIST Information Technology Laboratory, in charge of the biometric portion of the FIPS 201 update.|
By year's end, NATO’s rapid reaction team of network defenders is expected to be operational. These cyber experts will be capable of deploying within 24 hours to any NATO nation undergoing crippling attacks on its information technology infrastructure or to the battlefield in support of warfighters.
In an open letter to decision makers in Washington, D.C., last week, several superpowers of the Web called for global government surveillance reform. Citing this year’s revelations of the U.S. government’s collection of private citizens’ information, these companies “believe it is time for the world’s governments to address the practices and laws regulating government surveillance of individuals and access to their information.” Wait a minute. Don’t these firms collect information about citizens all the time? Aren’t efforts for national security just as important as the quest to send Web viewers only the advertisements they want to see?
AFCEA International’s Corporate Member Only Forum will focus on current and future cybersecurity staff needs. A panel of experts will discuss what it takes to ensure network security through knowledge. Dr. Earnest McDuffie lead for the National Initiative for Cybersecurity Education, National Institute of Standards and Technology, will moderate the discussion.
The AFCEA Cyber Committee’s latest white paper is now available to download online. Titled “Insider Threat: Protecting U.S. Business Secrets and Sensitive Information,” the paper focuses on raising risk awareness by highlighting current issues and outlining continuous challenges.
AFCEA International is partnering with Carnegie Mellon University’s (CMU’s) Software Engineering Institute (SEI) to offer its members a comprehensive range of online cybersecurity training on an annual subscription basis. For the cost of a single five-day classroom course, AFCEA members who subscribe have unlimited access to more than 30 classes for one year. In addition, group discounts are available using the AFCEA Educational Foundation voucher program.
Government economics experts agree that sequestration is not—and probably never was—a threat or hard stop to force Congress to approve a federal budget. Instead, senators and representatives intended for the hammer to fall, so they could reduce federal spending yet go back to their constituents with clean hands and say, “It wasn’t me.”
SANS NetWars, an interactive security challenge, gives participants the chance to compete while earning continuing education units (CEUs) to help sustain certifications. The event will take place May 15 and 16, 2013, at the Virginia Beach Convention Center during AFCEA’s East: Joint Warfighting event. NetWars is a hands-on computer and network security competition that enables participants to test their experience and skills in a safe, controlled environment.