cyber

January 16, 2020
By Julianne Simpson
Photo Credit: FGC/Shutterstock

Essye Miller, principal deputy, Department of Defense chief information officer (DOD CIO), wants to reshape the cyber workforce conversation. And, she told the audience at the Cyber Education, Research and Training Symposium (CERTS), she needs their help.

January 16, 2020
By Julianne Simpson
Photo Credit: Gorodenkoff/Shutterstock

The most senior military cyber warfighters have defined the challenge of building a world-class cybersecurity workforce: We have great performers but not enough. Our accessions can barely keep pace with attrition; but we are scheduled to grow. We need a viable plan to increase capacity.

During a panel session at the Cyber Education, Research and Training Symposium (CERTS) in Augusta, Georgia, cybersecurity leaders discussed how to build the people who can protect the nation against the tens of thousands of very high-end professionals that Russia and China are putting out.

January 15, 2020
By Julianne Simpson
Photo Credit: Gorodenkoff/Shutterstock

Lt. Gen. Stephen G. Fogarty, USA, commanding general, U.S. Army Cyber Command, is preparing for the command's move from Fort Belvoir, Virginia, to Fort Gordon in Georgia later this year. Top of mind for the general though is not the physical move, it’s the people.

“It’s all about the people,” stressed Gen. Fogarty during his keynote at the third annual Cyber Education, Research and Training Symposium (CERTS) in Augusta, Georgia. “We cannot have a failure to imagine” what the future cyber workforce looks like.

January 14, 2020
By Kevin Gosschalk
Now that identity is the currency of the digital world and data is the fuel that powers the digital economy, digital identities are continually being compromised on multiple levels. Credit: Tashatuvango/Shutterstock

Last year was a banner year for cyber fraud. In just the first six months of 2019, more than 3,800 breaches exposed 4.1 billion records, with 3.2 billion of those records exposed by just eight breaches. The scale of last year’s data breaches underscores the fact that identity has become the currency of the digital world and data is the fuel that powers the digital economy. What’s also clear looking back on 2019 is that digital identities are continually being compromised on multiple levels. 

January 9, 2020
By Robert K. Ackerman
Maj. Gen. Dennis A. Crall, USMC, deputy principal cyber advisor and senior military advisor for cyber policy, describes the Defense Department's cyber organizational activities at an AFCEA NOVA Chapter luncheon on January 9.

The U.S. Defense Department is providing the strategic template for cyber progress, which the military services must implement according to their own priorities and requirements. However, not all the parameters are sharply defined, and the department is responsible to Congress for ensuring that money is spent wisely and goals are met.

The department must determine “adequacy” as it reviews individual service cyber plans, and it is up to the department to explain to Congress where there is an inadequacy and why. This issue was described by Maj. Gen. Dennis A. Crall, USMC, deputy principal cyber advisor and senior military advisor for cyber policy, to an audience at an AFCEA NOVA Chapter luncheon on January 9.

January 6, 2020
By Wayne Lloyd
Network resilience and cyber resilience are similar but different, says Wayne Lloyd, RedSeal chief technology officer. Credit: Gerd Altmann/Pixabay

There are certainly similarities between network resilience and cyber resilience. The foundation for both is the ability to maintain business or mission capabilities during an event, such as a backhoe cutting your fiber cables or a nation-state actively exploiting your network. But there are also significant differences.

January 1, 2020
By Kimberly Underwood
A sensitive compartmented information facility may no longer be a fortress that bars entry to cellphones. Credit; Shutterstock/Andrea Crisante

Mobile technology is not always available to military or government personnel in all environments. Operating in a secure facility requires cellular phones or other mobile devices to be stowed outside the door. Companies are preparing solutions to enable the use of mobile devices in such accredited facilities in ways not seen before.

“The Defense Department deals with very sophisticated adversaries, and as a result, those devices are banned in many places and need to be controlled,” says Mike Fong, founder and CEO of Privoro.

January 1, 2020
By Maryann Lawlor
Credit: Rabbit_Photo/Shutterstock

The U.S. military relies heavily on companies to research, develop and manufacture innovative technologies to support missions. This hasn’t always been the case. A century ago, it was often the armed services that conceived and created the latest solutions. But when the world goes to war, it’s all hands on deck.

With unlimited resources, delving into fantastical technical solutions is easy. However, in the real world, the government and the private sector must solve real-life problems with realistic budgets. And today, both funds and available expertise are at a premium. Consequently, agencies must rely on companies they trust, and corporations only thrive when they invest in solutions likely to flourish in the future.

January 1, 2020
By Robert K. Ackerman
International hackers are not the only ones planting ransomware on unsuspecting victims. Nation-states also are using it as part of their cyber attack arsenal, and the FBI is working with domestic and international partners to thwart their efforts.

The FBI is increasing its cooperative efforts with U.S. government agencies and overseas allies as it wages an unending battle against growing cyber adversaries with escalating capabilities. Joining four major nation-states on the cyber threat list are terrorists and criminal organizations that constitute a mounting threat to U.S. national security, including the economy. The FBI faces the challenge of keeping up with these enemies, while knowing that they are relentless in their pursuit of cyber supremacy to achieve their goals.

January 1, 2020
By Lt. Col. Daniel J. Crawford, ARNG
The Ohio National Guard Cyber Mission Assurance Team conducts network assessments during Cyber Shield 19. The Cyber Mission Assurance teams help secure the critical infrastructure that services U.S. Defense Department installations. Credit: Staff Sgt. George Davis, OHNG

To remain relevant, the Army National Guard must completely divest GuardNet, its information technology network, and converge with the Army’s Department of Defense Information Network. This step will prevent the Guard from reverting to a strategic reserve and enable full-time staffing of tactical communication system readiness to completely participate in dynamic force employment as an operational reserve. It also will repurpose the resources allocated to managing this nondeployable network so tactical units can meet the faster deployment time lines needed in the new security environment.

January 1, 2020
By Tim Schaad
ManTech  conducts a cyber testing and training exercise with cyber experts from the financial sector.

The rapid pace of technology adoption has leveled the playing field in global competition and opened new warfare domains in the space and cyber realms. To maintain their competitive advantage, U.S. warfighters must find ways to simplify and streamline technology upgrades and fixes in the field, as well as develop processes to onboard new technology solutions faster. Open architecture and modular systems present compelling solutions to achieve this goal.

January 1, 2020
By Jim Barrineau, Jamie Dos Santos and Steve Shirley
A company considering a cyber insurance purchase must determine the risk to its organization and if a single policy will cover the type of loss it may experience.

Cyber insurance can protect organizations from losing more than data, but choosing a cyber insurer and policy comes with its own caveats. The purchase decision maker must consider an individual company’s circumstances, such as revenue, risk tolerance, board guidance and regulatory environment relative to protected categories of information. In addition, every purchase decision must be critically reviewed, particularly regarding the extent of coverage exclusions in each policy.

January 1, 2020
By Maj. Gen. Jennifer Napper, USA (Ret.)

Long before the federal government charged two defendants in 2018 for ransomware attacks on municipal computer systems—including Atlanta’s—cities found ways to make do during these outages. Police wrote reports by hand, traffic tickets were paid in person and social media kept everyone informed in a way that showcased a city’s resiliency.

April 1, 2019
By Kimberly Underwood
The Air Force is becoming more of a software company with hardware components, and is buying capabilities, says Col. Chad Raduege, USAF, director of cyberspace and information dominance, Air Combat Command.

Last year, the Air Force announced it was moving the 24th Air Force, which specializes in cyber operations, and the service’s Cyber Mission from the Air Force Space Command to the Air Combat Command. This spring, the Air Combat Command is working on the merger of those cyber components with its intelligence, surveillance and reconnaissance (ISR) capabilities from the 25th Air Force and integrating cyber into its operations.

The move, which started eight months ago, signifies a shift in the Air Force’s emphasis on putting cyber into everyday operations, said Col. Chad Raduege, USAF, who has been nominated for appointment to brigadier general, director of cyberspace and information dominance, Air Combat Command (ACC).

March 14, 2019
By Kimberly Underwood
Gaining experience with information operations in Afghanistan and hosting several pilot programs will help the rise of the U.S. Army’s information warfare capabilities and aid the transformation of the Cyber Command into an information operations warfare command, says Lt. Gen. Stephen Fogarty, USA, commanding general, Army Cyber Command. Photo by Michael Carpenter

The Army is transforming its Cyber Command to meet the challenges of a multidomain battlefield. Just over eight years old, the command, located at Ft. Gordon, Georgia, will evolve by 2028 into something possibly called the Army Information Warfare Operations Command, which will fully incorporate cyber, electronic warfare and information operations.

December 1, 2019
By George I. Seffers
Army C5ISR Center employee Donovan Sweet conducts research for the C4ISR Modular Autonomy project at Camp Grayling, Michigan, in October. The Army wants to build a fast, agile and lethal Remote Combat Vehicle capable of avoiding electronic warfare and cyber attacks. Credit: Dan LaFontaine, Army public affairs official

The U.S. Army envisions future robotic vehicles that are easy for soldiers to operate while proving difficult for enemy forces to detect, jam or hack. Researchers at one of the service’s premier research and development centers are racing to build the sensors, communications links and software needed to make that vision a reality.

December 1, 2019
By Robert K. Ackerman
Undersea fiber constitutes the backbone of international e-commerce for the world’s richest nations. However, issues regarding territorial access and oversight remain unresolved. Credit: Shutterstock/Christoph Burgstedt

Fiber is booming as telecommunications customers seek more services both in the cloud and at the network’s edge. The most important part of society’s information infrastructure, it is relatively secure in the face of attempts to wreak devastating harm to the nation, experts say. But that security is not absolute, and potential vulnerabilities could open up optical fiber to damaging attacks. Damage to this infrastructure, which serves as the backbone of the Internet and all the e-commerce that travels over it, could bring about an unprecedented economic upheaval.

December 1, 2019
By George I. Seffers
Positioning, navigation and timing is critical to an array of critical infrastructure areas, including the electrical power grid, finance and transportation. The U.S. government is working to harden so-called PNT systems against jamming, spoofing and other vulnerabilities, in part by developing a resiliency framework. Credit: Shutterstock/NicoElNino

Over the next year, U.S. government officials intend to develop an initial conformance framework to ultimately improve resilience for systems that provide positioning, navigation and timing for a wide variety of users. That initial framework will focus on timing, and lessons learned will be used to develop more comprehensive versions.

December 1, 2019
 
At the Cyber Education, Research, and Training Symposium 2019, Brig. Gen. Dennis A. Crall, USMC, (now a Maj. Gen.) principal deputy cyber adviser, Office of the Secretary of Defense, said warfighter education and training must focus on mission preparation.

The top five U.S. cybersecurity workforce positions in demand today are information systems security developer, information systems security manager, systems developer, research and development specialist, and software developer. To fill these posts, entry-level positions must be developed in the areas of systems administrators, network operations and cyber operator specialists. All of this demand requires a steady supply of training.

November 20, 2019
 

Lockheed Martin Corp., Orlando, Florida, was awarded a $93,000,000 cost-plus-fixed-fee contract for a national cyber range that provides the ability to conduct realistic cybersecurity test and evaluation of major Department of Defense (DoD) acquisition programs and the ability to conduct realistic training, certification and mission rehearsal events for the DoD Cyber Mission Force. One bid were solicited with one bid received. Work locations and funding will be determined with each order, with an estimated completion date of November 19, 2021. U.S. Army Contracting Command, Orlando, Florida, is the contracting activity (W900KK-20-D-0001).

Pages