The Cyber Edge

The Cyber Edge Home Page

July 1, 2022
By George I. Seffers
Soldiers conduct preventive maintenance checks on an AH-64D Apache Longbow helicopter during training at the Grafenwoehr Training Area in Germany. Army photo by Spc. Nathanael Mercado

In the two years since the Army Software Factory launched, it has sent multiple applications into production. And those apps are being developed in large part by soldiers in nontechnical career paths, including combat engineers, medics and maintenance.

Army Futures Command launched the software factory in July 2020 to test the possibility of soldiers and Army civilian employees adopting commercial practices and building software solutions for the service. If the concept proves successful, it could demonstrate a more versatile model for building and fielding Army software while also preparing soldiers to operate on a highly technical and disconnected future battlefield.

July 1, 2022
By Veronica Wendt, Michelle Ann Guo and Dr. Anteneh Girma
Access control vulnerabilities for cloud, wireless and IoT include sensitive data exposure, missing function-level access control, weak encryption and lack of auditing to review physical/logical access. Shutterstock/Andrew Suslov

New capabilities and platforms, such as Internet of Things devices and cloud computing, require updated cybersecurity implementation strategies across different technologies and platforms. One approach is to examine multiple capabilities and platforms, identifying shared vulnerabilities and mitigation strategies. Benefits of this are three-fold: results can better inform an organization’s risk assessment, limited resources can be prioritized for higher risk vulnerabilities and overall complexity of security management can be reduced. One example of this strategy is to examine cloud computing, Internet of Things devices and Wi-Fi wireless networks to find shared vulnerabilities.

July 1, 2022
By Morgan Livingston
Operationalizing secure machine learning starts at the human level. Shutterstock/Gorodenkoff

The technical features of artificial intelligence introduce vulnerabilities and lend the technology to adversarial use. And securely deploying artificial intelligence depends on integration into existing organizational structures. Leveraging and securing machine learning requires a sociotechnical approach.

July 1, 2022
By Elie Alhajjar
Threat Tracker is an autonomous threat detection system developed by a small team of engineers and scientists within Naval Surface Warfare Center Panama City Division’s Coastal and Maritime Security branch. Integrated with an advanced unmanned surface vehicle, this system can provide a fully autonomous USV escort capable of detecting and stopping a wide variety of threats. (U.S. Navy graphic)

Imagine the following scenarios: An explosive device, an enemy fighter jet and a group of rebels are misidentified as a cardboard box, an eagle or a sheep herd. A lethal autonomous weapons system misidentifies friendly combat vehicles as enemy combat vehicles. Satellite images of a group of students in a schoolyard are misinterpreted as moving tanks. In any of these situations, the consequences of taking action are extremely frightening. This is the crux of the emerging field of adversarial machine learning.

July 1, 2022
 

Raj Iyer, Army chief information officer, advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.

What are your biggest accomplishments as Army CIO so far?

It was important to establish a vision and strategy for digital transformation across the Army, and we accomplished that through the Army Digital Transformation Strategy. The strategy was important to align Army priorities and achieve unity of efforts across the Army—strategic, operational and tactical, and across all three components—Active, Guard and Reserve.

June 27, 2022
By Kimberly Underwood
Cyber and national security experts are quite alarmed with the systemic cybersecurity vulnerabilities of Microsoft Corp’s products, the company’s dependence on China for product revenue and associated consolations to the Chinese government, as well as the U.S. government’s incredible reliance on the Microsoft products across its agencies. Credit: Shutterstock/The Art of Pics

SIGNAL Media is reaching out to Microsft Corp. for comment and this article will be updated accordingly.

June 1, 2022
By George I. Seffers
Fifth-generation cellular communications will be more secure than predecessor technologies but will also introduce vulnerabilities, in part because of the vast expansion of devices that is expected with the emergence of the Internet of Things. SERDTHONGCHAI/Shutterstock

A Homeland Security Department program designed to secure fifth-generation cellular communications known as 5G could complete the last of its nine projects next year.

June 21, 2022
By Kimberly Underwood
Eric Mill, a senior advisor to the federal chief information officer and one of the primary authors of the Office of Management and Budget’s zero trust policy, speaks with Matthew McFadden, vice president, cyber and distinguished technologist, General Dynamics Information Technology, at a Billington CyberSecurity event on June 16.

Issued back in late January, the M-22-09 memorandum from the Office of Management and Budget (OMB), entitled Moving the U.S. Government Toward Zero Trust Cybersecurity Principles and issued by OMB acting director Shalanda Young, required federal agencies to meet specific cybersecurity standards and objectives by the end of fiscal year 2024. Eric Mill, a senior advisor to Federal Chief Information Officer Clare Martorana, who helped draft the federal zero-trust architecture (ZTA) strategy, advised agencies to have a mix of “specific and very tangible” technical steps as well as some broader architectural changes.

June 13, 2022
By George I. Seffers
F-16 Fighting Falcons conduct aerial operations in the U.S. Central Command area of responsibility in May. In theory, a cyber attack on a military base wastewater treatment plant could prevent jets from providing air support during combat, experts say. Credit: Air Force Master Sgt. Matthew Plew

Converging operational systems with information systems provides an array of benefits but also allows increased opportunities for cyber adversaries. Among other remedies, two experts in the Defense Department and industry recommend zero-trust cybersecurity and training and education to cope with the increased threat.

Josh Brodbent, regional vice president for solutions engineering for the public sector, at BeyondTrust, and Lance Cleghorn, a digital services expert at Defense Digital Services (DDS), describe operational technology as systems that haven’t normally been connected to the Internet but are now becoming so at a rapid pace.

June 1, 2022
By Kimberly Underwood
Space Delta 2’s inaugural 19th Squadron in Dahlgren, Virginia, will be performing cislunar domain awareness, a key new mission to surveil and identify both friendly and adversarial activity in the space beyond the geosynchronous orbit. NASA illustration of its CAPSTONE mission that involves a microwave oven-sized CubeSat flying in cislunar space, the orbital space near and around the moon.  Illustration by Daniel Rutter, NASA

With the growing number of satellite constellations comes an increasing amount of congestion in space, in addition to existing space assets and debris. But beyond the need to identify and manage space congestion is a role not quite as needed before—that of space defense. The ability to protect assets in space from adversaries is critical to the U.S. military and allies, and it starts with adroit space domain awareness. The operators of the U.S. Space Force’s Space Delta 2 aim to provide this crucial function.

June 1, 2022
By George I. Seffers
A Rydberg receiver and spectrum analyzer detect a wide range of real-world radio frequency signals above a microwave circuit, including AM radio, FM radio, Wi-Fi and Bluetooth.  U.S. Army illustration

U.S. Army researchers are developing a quantum sensor capable of detecting electromagnetic emissions across frequency bands and at far greater ranges than traditional receivers and are considering demonstrating the capability with soldiers later this year.

The technologists at the Army’s Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center envision a shoebox-sized device capable of detecting signals across bands such as long band, short band and conventional band, which are often shortened to L-, S- and C-bands. The device might also pick up signals at far greater distances.

June 1, 2022
By George I. Seffers
After overhauling cyber training and achieving unusually high rates for students passing the National Security Agency’s cyber training, the Air Force’s 39th Information Operations Squadron shares lessons learned with others.  U.S. Air Force photo by J.M. Eddins Jr.

Passing the National Security Agency’s comprehensive cybersecurity training is no easy feat, but the Air Force’s 39th Information Operations Squadron has achieved unusually high success rates in getting students through the programs.

May 1, 2022
By Robert K. Ackerman
Two U.S. Army special forces soldiers conduct radio checks during Exercise Combined Resolve in December, which included special operations forces from Ukraine. The U.S. Special Operations Command is pursuing multiple approaches to establish communications links with special forces and partner nations, and these approaches may become part of conventional force operations.  U.S. Army photo

The U.S. Special Operations Command is developing an information technology architecture and operational plan that eventually may evolve into a template for overall U.S. Defense Department military operations. Many of the needs expressed by special operations forces are not unlike those experienced by elements of conventional service forces, and successful development and deployment of special operations digital systems can have a direct bearing on departmentwide military systems.

May 18, 2022
Posted by Kimberly Underwood
The Cybersecurity and Infrastructure Security Agency issued an emergency directive requiring federal agencies to apply VMware updates or remove specific VMware products from use until protective updates can be applied given four possible exploitable vulnerabilities that could allow cyber marauders to cause significant harm. Credit: Shutterstock/rafapress

On May 18, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive (ED) (ED 22-03) that requires federal agencies to apply VMware updates or remove specific VMware products from use until protective updates can be applied. The products possess four possible exploitable vulnerabilities that would allow cyber marauders to execute remote code on a system without authentication and to elevate network access privileges.

“For all affected VMware products identified as being accessible from the internet, agencies are directed to assume a compromise and immediately disconnect the product from their network and conduct threat hunt activities,” CISA stated. 

May 11, 2022
By George I. Seffers
There is no one-size-fits-all approach to information warfare. Daniel Wussow/Shutterstock

A group of senior noncommissioned officers (NCOs) from the various military services argued against a one-size-fits-all approach to information warfare.

An audience member at the AFCEA Cyber Education Research and Training Symposium challenged the high-ranking NCOs on a perceived need for joint, standardized training. The questioner pointed out that the services do not even use the same terminology. For example, the Marines have a concept for information maneuver, the Army is developing an information advantage strategy, and the Air Force and Navy both prefer the term information warfare.

But the panel disagreed a unified program is needed or beneficial.

May 11, 2022
By George I. Seffers
Cyber educators highly encourage those who have previously worked or are currently working in cybersecurity to teach part time. Shutterstock/4LUCK

A panel of cyber educators today encouraged subject matter experts in the military and industry to teach cybersecurity part time.

The panel enthusiastically embraced the suggestion from an audience member at the AFCEA Cyber Education Research and Training Symposium on May 11 in Augusta, Georgia.

May 11, 2022
By George I. Seffers
Lt. Gen. Maria Barrett, USA, commander, Army Cyber Command, addresses CERTS 2022.

The U.S. Army is seeing a successful integration of cyber operations and electronic warfare operations but could more effectively add information operations to the mix, according to Lt. Gen. Maria Barrett, USA, commander, Army Cyber Command.

In her first public speaking engagement since taking charge at Army Cyber Command, Gen. Barrett offered the morning keynote speech at the AFCEA Cyber Education, Research and Training Symposium (CERTS) on May 11 in Augusta, Georgia.

May 10, 2022
By George I. Seffers
Brig. Gen. Paul Craft, USA, commandant, U.S. Army Cyber School, speaks on a panel at CERTS 2022. Photo by Michael Carpenter

The U.S. Army in the past 30 days kicked off 10 Junior Reserve Officers’ Training Corps focused specifically on students interested in cyber careers. The service also has offered the first direct commission to a lieutenant colonel in the cyber realm and will soon do the same for a full colonel.

Brig. Gen. Paul Craft, USA, commandant, U.S. Army Cyber School, told the audience at the AFCEA Cyber Education Research and Training Symposium (CERTS) in Augusta, Georgia, that the new Junior ROTC efforts are important for the Army and for the nation. “That’s a big thing for the U.S. We now have multiple focused Cyber Junior ROTC programs in our nation, and they will expand over time.”

May 10, 2022
By George I. Seffers
David Frederick Jr., executive director at U.S. Cyber Command, addresses the audience at CERTS 2022. Photo by Michael Carpenter

Earlier this year, U.S. Cyber Command and the cyber components of each of the military services initiated an academic engagement network to reach out to students interested in potentially supporting military cyber missions. In the coming months, Cyber Command will invite network members to help solve hard problems in the cyber arena, including technical, policy and strategy challenges.

May 10, 2022
By George I. Seffers
CERTS 2022 panelists discuss cyber training for the services.

A panel of cyber experts discussing the pros and cons of dramatically expanding joint cyber training among the military services and other agencies agreed the pros outweigh the cons.

The panel discussion took place on the second day of the AFCEA Cyber Education, Research and Training Symposium (CERTS), May 10, in Augusta, Georgia.

Moderator Robert Kazimer, deputy to the commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, told the audience he intended to ask provocative questions but that on the subject of joint training the participants agreed.

May 9, 2022
By George I. Seffers
Brig. Gen. Paul Stanton, commander, U.S. Army Cyber Center of Excellence, speaks at CERTS 2022. Photo by Michael Carpenter

The United States needs to add computer skills to elementary education, and the military needs to broaden its cyber training. That was the gist of the message from Brig. Gen. Paul Stanton, USA, commander, U.S. Army Cyber Center of Excellence, during his opening remarks on the first day of the AFCEA Cyber Education, Research and Training Symposium (CERTS), May 9, in Augusta, Georgia.

May 9, 2022
By George I. Seffers
Rear Adm. Michael Ryan, USCG, former commander, Coast Guard Cyber Command, participates in a panel at CERTS 2022. Photo by Michael Carpenter

A ransomware attack on a major maritime corporation could have affected its vessels in the Mid-Atlantic region, causing a U.S. Coast Guard officer to take extra precautions, according to Rear Adm. Michael Ryan, USCG, former commander, Coast Guard Cyber Command.

Adm. Ryan left his position at Coast Guard Cyber Command last week and is now the deputy for operational policy and capabilities at Coast Guard Headquarters.

May 09, 2022
By George I. Seffers
Joyce Corell, senior technical advisor to the national cyber director, addresses the audience at CERTS 2022. Photo by Michael Carpenter

The Office of the National Cyber Director (ONCD) is planning a cyber workforce development summit that could take place as early as June, and it could be accompanied by a White House strategy on cyber workforce development, reports Joyce Corell, senior technical advisor to the national cyber director.

The ONCD was formed on January 1 of last year under the National Defense Authorization Act for Fiscal Year 2021. It was initially recommended by the Cyberspace Solarium Commission, a panel authorized by Congress.

ONCD officials are working with the secretaries of labor, education and homeland security as well as congressional offices and other “government stakeholders” on the workforce development summit, Corell reported.

April 28, 2022
By Kimberly Underwood
The extent of global cyber attacks in 2021 reached a level, complexity and sophistication not seen before, experts say. Credit: Shutterstock/supimol kumying

Cybersecurity officials from Australia, Canada, New Zealand, the United Kingdom and the United States issued an advisory April 27 disclosing the most common digital vulnerabilities and exposures routinely leveraged by cyber attackers in 2021. Of the top 15 software vulnerabilities identified across all of the countries, Microsoft products accounted for nine such issues.

The United States’ Cybersecurity and Infrastructure Security Agency, National Security Agency and FBI collaborated with the Australian Cyber Security Centre, Canadian Centre for Cyber Security, New Zealand National Cyber Security Centre and United Kingdom’s National Cyber Security Centre to issue the advisory.

May 1, 2022
By Kimberly Underwood
With Internet of Behaviors approaches being used more and more to influence human behavior, adding in explainable artificial intelligence platforms can aid humans’ understanding. Shutterstock/Zentangle

The application of explainable artificial intelligence to Internet of Behavior techniques may help provide a more trusted and understandable framework in changing human behaviors, researchers say. This combination of Internet of Things devices, artificial intelligence, data analytics and behavioral science can also achieve user and business benefits, according to a study.

May 1, 2022
By Robert K. Ackerman
While Russia has a strong community of private sector hackers willing to engage in global cyber attacks for their nation, the United States also has its own patriotic hackers who can engage in their own form of wreaking digital havoc in Russia—possibly in coordination with U.S. government efforts.  Alexander Geiger/Shutterstock

Russia’s well-known cyber attacks on Western nations could be setting the country up for a powerful backlash, offers a retired U.S. Army expert formerly based in Moscow. After years of relentless penetrations and attacks on databases and infrastructure in U.S. and NATO countries, Russia now is finding itself as much—if not more—of a target of reciprocal cyber assault capabilities increasingly wielded by the West.

April 26, 2022
By Kimberly Underwood
With an estimated 400,000 unfilled cyber jobs in the United States, the Cybersecurity and Infrastructure Security Agency started several initiatives to grow the cyber professional workforce, reports David Mussington, executive assistant director for Infrastructure Security at the agency, speaking at AFCEA’s TechNet Cyber 2022 conference.

The U.S. government agency known as CISA, charged with helping the country manage and reduce the risks of cyber threats to digital and physical infrastructure, is pursuing several efforts to add cyber professionals to the workforce. Experts say there are almost 2.7 million unstaffed cyber positions globally, with almost 400,000 unfilled cyber jobs in the United States, according to a recent (ISC)² Cybersecurity Workforce Study. This year, CISA—the Cybersecurity and Infrastructure Security Agency—started several initiatives to grow the cyber professional workforce, reported David Mussington, executive assistant director for Infrastructure Security at the agency.

January 1, 2022
By George I. Seffers
A team leader with 1st Battalion, 504th Parachute Infantry Regiment, directs movements of his team using the Harris Leader Radio during an assault on an objective during the initial operating test for the system. The rapid development and fielding of cutting-edge systems help drive the need for agility and adaptability at Army signal and cyber schools.  Nicholas Robertson, U.S. Army Operational Test Command Visual Information Specialist

The U.S. Army’s massive modernization effort requires rapid adaptability in the courses being taught in its cyber and signal schools. Efforts are underway to fundamentally change the approach to teaching and instituting courses for zero trust, cloud computing and other technology advances that will affect the future of combat.

May 1, 2022
By Kimberly Underwood
Adversaries such as China are employing Internet of Behaviors approaches on a wider scale.  Shutterstock/Hugethank

The confluence of advanced digital tools, such as computer vision, along with Internet of Things devices, data science and knowledge of human nature, is enabling the greater ability to track, analyze and prompt human behavior. The use of this approach, referred to as Internet of Behaviors, is expected to skyrocket, with an estimated 40 percent of the global population’s activities by 2023 thought to be tracked digitally to influence behavior, according to Stamford, Connecticut, research firm Gartner.

May 1, 2022
By Kimberly Underwood
Intelligence community leaders, including (l-r) FBI Director Christopher Wray; Gen. Paul Nakasone, USA, director, National Security Agency and commander, U.S. Cyber Command; Avril Haines, director of National Intelligence, Office of the Director of National Intelligence; CIA Director William Burns; and Gen. Scott Berrier, USA, director, Defense Intelligence Agency, testify before Congress in March about lessons learned from Russia’s invasion of Ukraine.  Senate Select Committee on Intelligence

February’s invasion of Ukraine by Vladimir Putin was a shock to geopolitical order. NATO and the United States acted quickly to aid Ukraine while avoiding entering a war against Russia and shoring up any threat to NATO and the United States. From their early observations of the war, U.S. officials from Congress, and the cyber and intelligence communities are looking closely to glean understanding and apply key knowledge to U.S. actions and defenses.

May 1, 2022
 
Credit: NDanko/Shutterstock

As the National Security Agency’s (NSA’s) cybersecurity director, Rob Joyce oversees the agency’s Cybersecurity Directorate, which was established to prevent and eradicate cyber threats to the Defense Department, national security systems and the defense industrial base. He has served in both the cybersecurity and signals intelligence missions at NSA since 1989 and worked as the cybersecurity coordinator and acting homeland security advisor at the White House.

What would you say are your—or your team’s—greatest achievements since you started this job?

April 28, 2022
By George I. Seffers
Stephen Wallace, chief technology officer and director of DISA’s Emerging Technology Directorate, shown during a session of TechNet Cyber 2022, told reporters during a media roundtable at the conference that his organization already is evaluating future capabilities for the next generation of Thunderdome. Photo by Michael Carpenter

The Defense Information Systems Agency (DISA) is still in the prototyping stage with its zero-trust solution but already is looking ahead to the next version.

Thunderdome, the prototype being developed by Booz Allen Hamilton under a six-month contract awarded in January, is DISA’s solution for implementing zero-trust cybersecurity. It is a comprehensive effort requiring cooperation across the agency, as well as with the military services, combatant commands and others.

April 26, 2022
By George I. Seffers
Recent lessons learned from the Defense Information Systems Agency's Thunderdome program include the need to move more quickly to implement zero trust on the Defense Department's classified network known as SIPRNet. Credit: ArtemisDiana/Shutterstock

The U.S. Defense Information Systems Agency (DISA) intends to double down on the security of its classified networks in the coming months as it experiments with the zero-trust prototype known as Thunderdome.

Julian Breyer, DISA’s senior enterprise and security architect, reported a change in priorities while discussing Thunderdome during a panel session at AFCEA’s TechNet Cyber conference in Baltimore, April 26.

April 26, 2022
By George I. Seffers
Emerging leaders in industry discussed the trends influencing the future of artificial intelligence in the cyber realm during a panel discussion at AFCEA TechNet Cyber 2022 in Baltimore. Credit: Fit Ztudio/Shutterstock

A panel of artificial intelligence (AI) experts from industry discussed some of the technology’s promise and perils and predicted its future during an AFCEA TechNet Cyber Conference panel April 26 in Baltimore.

The panelists were all members of AFCEA’s Emerging Leaders Committee who have achieved expertise in their given fields before the age of 40. The group discussed AI in the cyber realm.

April 26, 2022
By Kimberly Underwood
Army Deputy Chief of Staff G-6 Lt. Gen. John Morrison, USA, shown at the Pentagon, was a keynote speaker at TechNet Cyber 2022.

The Army’s Unified Network, which will enable the service to deliver the strategic, operational and tactical effects that maneuver commanders need across joint and coalition operations, is advancing, said Lt. Gen. John Morrison, USA, deputy chief of staff and the Army G-6, speaking at AFCEA’s TechNet Cyber conference in Baltimore on April 26.

April 12, 2022
By Will Nelson
Lessons learned from the monarchs of history offer four modalities for coping with Russian cyber aggression. Credit: Shutterstock

Starting from the first recorded raid on the monastery of Lindisfarne in 793, Viking raids presented European rulers with an unprecedented challenge. Fast, sleek longships could stealthily deploy alongside the coasts of early medieval England and France, striking at wealthy, isolated targets and departing before local authorities could mount a response.

April 1, 2022
By George I. Seffers
The U.S. Air Force’s 39th Information Operations Squadron is expanding its courses to meet increased demand for expertise in the information realm.  Credit: DeymosHR/Shutterstock

With information operations (IO) in the world stage spotlight, the U.S. Air Force sees a growing need for experts in the field and is taking steps to expand training opportunities with the 39th Information Operations Squadron (IOS).

The 39th IOS, located at Hurlburt Field, Florida, trains Air Force personnel in information and cyber operations, including both offensive and defensive cyber skills. The unit conducts qualification and advanced training to provide mission-ready information and cyber warfare operators for all Air Force major commands.

April 8, 2022
DISA's Chief Data Officer Takes Charge
The Defense Information Systems Agency’s new office to handle data is striving to advance the agency’s and warfighters’ data-driven capabilities, says Acting Chief Data Officer Caroline Kuharske. Credit: DISA photo with Chris D’Elia graphics

With the creation of its first Chief Data Office, the U.S. Defense Information Systems Agency is stepping into a more data-centric vision. The need for enhanced data management, technologies and policies is necessary to support greater ventures of agency operations and improved decision making and operability for warfighters, explained Caroline Kuharske, acting chief data officer, Defense Information Systems Agency.

April 1, 2022
By Robert K. Ackerman
NATO’s Deputy Secretary General Mircea Geoana, along with a group of alliance ambassadors, visits the NATO Alliance Ground Surveillance Force in Sigonella. The U.S. Defense Information Systems Agency (DISA) is working with its NATO allies to improve communications across the breadth of alliance activities and systems.  NATO

The battle for cyberspace may hinge on outer space as experts expand the digital frontier. The leading U.S. military communications organization is working with partners in NATO to exploit and dominate space communication systems with an eye to hurling defense systems into an advanced technology future.

April 1, 2022
By Paul Beckman
Extended detection and response (XDR)offers critical collective monitoring of identity management, intrusion sensors, firewall and cloud applications. PopTika/Shutterstock

In today’s cyber environment, the attack surface grows exponentially day after day with no sign of slowing. With the near-geometric growth of applications, the signal-to-noise ratio has been amplified into the stratosphere. The result: The hunt for timely and important context in system and network telemetry is like trying to find a particular needle in a sea of needles.

Equally challenging is the “dwell time” of attacks—the period between initial penetration and the point of detection/eradication. In 2020, the average global dwell time was 56 days. That means that an attacker had nearly two months inside a network on average before being discovered.  

April 1, 2022
By George I. Seffers
The Defense Information Systems Agency created teams with representatives from across the agency to help define its zero trust-solution known as Thunderdome. By enhancing interagency communication and operation, the approach may change the way DISA does business.  Tartila/Shutterstock

Thunderdome, the Defense Information Systems Agency’s zero-trust solution, may enhance cybersecurity while also transforming the way the agency does business.

April 1, 2022
By Kirk Nilsson
MPE must support rapid decision making from the strategic to tactical level. At the cutting edge of coalition operations, a Green Beret with the U.S. Army’s 1st Special Forces Group (Airborne) clears a room alongside Royal Thai Army soldiers during Cobra Gold 21.  Courtesy Photo, 1st Special Forces Group (Airborne)

Today, more than ever, combatant commands, joint task forces, service components and supporting agencies need the mission partner environment to deliver the same capabilities envisioned for the U.S. Defense Department’s Joint All-Domain Command and Control concept. With two near-peer competitors dominating the defense strategy, the need for an enterprise-level mission partner environment has never been greater for promoting security cooperation while maintaining military readiness. As Cliff Fegert, former director of the Mission Partner Capabilities Office noted, “With two near peers, we do not have the luxury of preparation time, and we must have allies/partners to deter or win.”

March 28, 2022
By Shaun Waterman
The recently passed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires critical infrastructure operators to swiftly report substantial cyber incidents. Credit: Andrea Izzotti/Shutterstock

There’s a wind of change blowing through federal cybersecurity policy. The new SEC proposal for mandatory disclosure of cybersecurity incidents by publicly traded companies is one straw in that wind. The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) is another. But it’s a pretty hefty straw.

March 23, 2022
Henry S. Kenyon

In times of global crises such as the COVID-19 pandemic and the war in Ukraine, the Defense Information Systems Agency (DISA) is working to make sure the U.S. Defense Department’s communications networks are running securely to provide leaders and warfighters with the information they need.

A key aspect of this is velocity of action, using innovation and initiative to gain an advantage over adversaries, DISA officials told SIGNAL Magazine Editor in Chief Robert Ackerman during the first of a series of TechNet Cyber 2022 webinars.

March 24, 2022
By Kimberly Underwood
The U.S. 7th Fleet's flagship, USS Blue Ridge (LCC 19), sails in the Philippine Sea in April 2021. The Navy is looking for industry cyber solutions to help protect the fleet in a contested maritime environment. Credit: U.S. Navy photo by Mass Communication Specialist 2nd Class Reymundo A. Villegas III

The U.S. Navy’s Naval Information Warfare Center Atlantic Palmetto Tech Bridge is seeking industry solutions for cyberspace defense in denied, degraded and disconnected environments. The effort is open to any U.S. company, academia or other organization and accepted proposals will be evaluated at the Cyber Advanced Naval Technology Exercise that starts September 6, 2022, and runs for two weeks.

March 15, 2022
By Kimberly Underwood
Cyber strengthening efforts by the National Security Agency (NSA), U.S. Cyber Command, other governmental agencies and the private sector have aided Ukraine, at least initially, according to NSA Director General Paul Nakasone, USA, and commander, U.S. Cyber Command, testifying before the U.S. Senate last week.

An effort to help Ukraine protect its critical infrastructure from cyber attacks has succeeded at least initially. Steps taken by various governmental agencies and private industry before Russia invaded Ukraine on February 24 have strengthened its cybersecurity, said Gen. Paul Nakasone, USA, commander of U.S. Cyber Command, director of the National Security Agency and chief of the Central Security Service, testifying before the U.S. Senate Select Committee on Intelligence last Thursday.

March 8, 2022
By James Stanger
Workforce education seems to be the secret weapon organizations use to successfully implement zero trust. Credit: Stuart Miles/Shutterstock

This article is part of a series that explores zero trust, cyber resiliency and similar topics.

Over the past year or so, I’ve discovered the secret weapon that IT leaders of various U.S. government entities have deployed as they implement zero trust architectures. Their first step has been to create a comprehensive educational pathway for their workers. This is because no one can implement zero trust alone.

Zero trust: Only education can move you forward

March 1, 2022
By George I. Seffers
The Department of Homeland Security’s Science and Technology Directorate is publishing an artificial intelligence and machine learning implementation plan and building a community of interest to foster adoption of the technology across the department. Credit: sdecoret/Shutterstock

The Department of Homeland Security Science and Technology Directorate could release its artificial intelligence and machine learning strategy implementation plan as early as this month and is growing a community of interest to foster the adoption of the technologies across the department.

March 1, 2022
By Robert K. Ackerman
 Two cyber experts in the Naval Information Warfare Systems Command (NAVWAR) review the cyber baseline process. NAVWAR is implementing new approaches to ensure the security and resiliency of Navy cyber assets.  U.S. Navy photo

The Naval Information Warfare Systems Command is addressing human-technology synergy by empowering its workforce to both adapt new technologies and adapt to new technologies. The command’s personnel are working with people in its industry partners on efforts that will affect operations across the entire Navy.

March 1, 2022
By Shaun Waterman
Artificial intelligence (AI)/machine learning (ML) is especially susceptible to hacking and can be attacked even without access to the computer network it runs on. Credit: Shutterstock/Sasun Bughdaryan

In the rush to implement national security use cases for artificial intelligence and machine learning, policymakers need to ensure they are properly weighing the risks, say experts in the field.

Like all software, artificial intelligence (AI)/machine learning (ML) is vulnerable to hacking. But because of the way it has to be trained, AI/ML is even more susceptible than most software—it can be successfully attacked even without access to the computer network it runs on.