cyber

July 1, 2018
By Lt. Cmdr. Jonathan White, USCG

Ever-expanding reviews and policies aren’t the only way to control enterprise information technology projects. Instead, management should establish clear standards and incentivize project managers to choose enterprise-friendly designs that streamline external reviews and eliminate the delays and costs associated with compliance.

Information technology projects have distinct requirements: cybersecurity, privacy and Section 508 compliance. These necessary requirements add a significant burden and can cause slowdowns and cost overruns. Other external challenges come from the budgeting process, procurement and configuration management.

June 29, 2018
By Paul Parker
Edge computing and the Internet of Things have the potential to enhance government agility and efficiency. Shutterstock

Wary that the Internet of Things (IoT) could be used to introduce unwanted and unchecked security risks into government networks, senators last year created a piece of legislation that placed minimum security standards around IoT devices sold to and purchased by government agencies.  The IoT Cybersecurity Improvement Act of 2017 specifically cites the need for regulation of “federal procurement of connected devices,” including edge computing devices, which are part of the IoT ecosystem.

June 27, 2018
By George I. Seffers
Soldiers assigned to the 3rd Cavalry Regiment, alongside Iraqi security forces, fire artillery at known Islamic State of Iraq and Syria locations near the Iraqi-Syrian border. The annual Cyber Quest experiment, which focused this year on cyber situational understanding, is designed to evaluate prototypical technologies and deliver systems to warfighters sooner. Army photo by Spc. Anthony Zendejas IV

U.S. Army officials conducting the third annual Cyber Quest experiment, which ends today, will issue a report in about 30 days that will determine which of the systems involved will transfer to programs of record. The exercise consists of an array of systems, including artificial intelligence and machine learning, that help provide situational understanding of the cyber and electronic warfare realms.

June 27, 2018
 

Cyber Defense Information Assurance, Round Rock, Texas, has been awarded a $12,150,174 modification to contract FA8773-15-C-0045 for Air Force enterprise-level network management, optimized communications and defensive measures at Air Force information network gateways. Work will be performed at Maxwell Gunter Air Force Base, Alabama, and is expected to be complete by July 8, 2018. Fiscal year 2018 operations and maintenance funds in the amount of $9,100,130 are being obligated at the time of award. The 38th Contracting Squadron, Tinker Air Force Base, Oklahoma, is the contracting activity.

June 26, 2018
By Jesse Price
As cyber attacks increase, the combination of big data capabilities and network analytics will allow network monitoring agents to shift from defense to offense. Credit: Shutterstock

Traffic on optical transport networks is growing exponentially, leaving cyber intelligence agencies in charge of monitoring these networks with the unenviable task of trying to sift through ever-increasing amounts of data to search for cyber threats. However, new technologies capable of filtering exploding volumes of real-time traffic are being embedded within emerging network monitoring applications supporting big data and analytics capabilities.

June 20, 2018
By Jane Melia
Cybersecurity trends so far this year include a stern reminder that the threat of nation-sponsored cyber attacks cannot be ignored. Credit: TheDigitalArtist/Pixabay

With the arrival of June, we’re at the halfway point of an already busy year for the cybersecurity industry. With each passing year, our sector continues to demonstrate its evolving approach to fighting cyber threats, as cyber crime itself continues to evolve.

As both business and government move forward with digital transformation initiatives to improve processes and efficiency, the overall security attack surface continues to expand with more potential points of access for criminals to exploit. However, our industry is tackling these challenges head-on, with numerous innovative solutions continuing to come to market.

June 1, 2018
By George I. Seffers

When National Science Foundation officials announced in February that three major providers of cloud computing were donating up to $9 million collectively for big data research, they already were looking for ways to broaden the effort to include a wider variety of topics, including cybersecurity. The expansion is intended to benefit both research and education initiatives and is necessary, in part, because the cloud providers now acquire cutting-edge hardware before it is made available to researchers.

June 1, 2018
By Kimberly Underwood
While the U.S. Army is working on significantly upgrading its situational awareness system Blue Force Tracking, in use on more than 98,000 platforms, its cyber situational awareness needs improvement, especially in red and gray zones. Army photo

The U.S. Army’s Communications-Electronics Research, Development and Engineering Center, known as CERDEC, is gearing up to face increasing asymmetrical threats in cyberspace. The center looks to improve cyber operations, information warfare, electronic countermeasures and information security, among other areas. Its efforts are prompted as the military finds itself fighting or preparing to fight more and more in cyberspace, in conjunction with the traditional domains of sea, air, land and space.

June 1, 2018
By Jane Melia
Credit: Den Schrodinger/Shutterstock

The potential geopolitical consequences of quantum communications will result in clear asymmetries in both knowledge and confidentiality of information. Countries whose data can be protected through quantum communication techniques will have a significant information advantage, a situation that would have important, albeit hard to predict, effects on geopolitical developments.

May 8, 2018
By Seli Agbolosu-Amison
Four policies give government agencies they flexibility and authority to limit cyber risks. Credit: katielwhite91/Pixabay

As a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers and take a more strategic approach to risk. Combined, these policy directives promise to transform our government into a robust digital society, gaining greater resiliency to cyber threats by leveraging opportunities while reinforcing standards and procedures.

Here’s a breakdown of the key components of the four policies:

May 31, 2018
By Paul Parker
After enjoying a period without peers, the U.S. now find itself facing a variety of threats, including Russia, China and terrorist groups. Credit: TheDigitialArtist/Pixabay

The days of the United States’ stature as a force without equal appear to be over. The threat of near-peer competition with increasingly sophisticated adversaries is growing. As Secretary of Defense James Mattis says in the National Defense Strategy, "America has no preordained right to victory on the battlefield."

June 1, 2018
By Kimberly Underwood
Sailors assist with the landing of a Marine Corps CH-53E Super Stallion helicopter on the deck of the U.S. Navy’s USS Wasp assault ship as part of an April certification exercise in the Philippine Sea. In its role of steering the Navy toward the best information technology for the 21st century, the Space and Naval Warfare  Systems Center (SSC) Atlantic is looking at cloud computing systems to support the warfighter. Credit: Petty Officer 3rd Class Levingston Lewis, USN

This month is a crucial time for the U.S. Navy, as far as information technology goes. Its Program Executive Office for Enterprise Information Systems is developing the request for proposal for its Next Generation Enterprise Network Re-compete contract that will provide information technology services, including cloud services, for more than 700,000 Navy and Marine Corps users.

May 30, 2018
By Don Maclean
Although hacking back against cyber criminals may seem morally justifiable, it can quickly spiral out of control. Credit: TheDigitalArtist/Pixabay

Whether a Social Security number from an individual, or financial information from a company, hackers continue to find ways to steal data from millions of Americans. To combat these crimes, the idea of active cyber defense has arisen on Capitol Hill with the introduction of the Active Cyber Defense Certainty (ACDC) Act.

In January, Homeland Security Secretary Kirstjen Nielsen voiced measured support for empowering companies to be more active in their approach to cybersecurity. These active measures would allow companies to access other computer networks in order to thwart cyber attacks, monitor the hackers, collect evidence or destroy stolen files.

May 24, 2018
By Robert K. Ackerman
Credit: fuyu liu/Shutterstock

Domestic cybersecurity has some new potential vulnerabilities to defend, according to the Department of Homeland Security’s (DHS’s) 2018 Cybersecurity Strategy. In addition to conventional concerns such as the water and power grids and the financial sector, the burgeoning number of Internet-connected devices and the global supply chain have emerged as areas that must be protected against a growing threat from a variety of adversaries.

May 22, 2018
By Julianne Simpson
During her morning keynote, Stempfley stressed the importance of using analytics to create situational awareness in cybersecurity.

Situational awareness is key to cybersecurity and using analytics can help create the situational awareness needed to defend the nation from adversaries. “Never before have we had the tools that we have today to understand the environment we’re in,” said Roberta “Bobbie” Stempfley, director, Carnegie Mellon University’s Software Engineering Institute, CERT Division, during her morning keynote at the AFCEA-GMU Critical Issues in C4I Symposium.

May 17, 2018
Kimberly Underwood
Panelists discuss partnerships in cyber warfare at the AFCEA Defensive Cyber Operations Symposium.

Thoughts by experts about the ability of the military to defend cyberspace are centering around the concept of improved partnerships, which may be outside of the Defense Department’s usual practices. A lot can be gained from the insight of coalition partners and think tanks—wisdom and information that the DOD may not have tapped into, experts said.

May 17, 2018
By Kimberly Underwood
Panelists at the Defensive Cyber Operations Symposium discuss directing change to organize the cyberspace warfighting domain.

Providing an information network that enables warfighters to perform global missions is not easy given the network itself is besieged constantly by cyber attacks. All U.S. Defense Department organizations use the complex technical infrastructure known as the Department of Defense Information Network (DODIN), and the responsibility to protect it 24/7 falls squarely on the shoulders of Joint Force Headquarters–Department of Defense Information Network (JFHQ-DODIN).

May 17, 2018
by Kimberly Underwood
Mark Russinovich, chief technology officer, Microsoft Azure, discusses machine learning at the AFCEA Defensive Cyber Operations Symposium.

Machine learning has advanced to the point where more sophisticated methods can be more effective at cyber event detection than traditional methods, an expert says. Along with emerging methods, access to large amounts of “fresh” data is important for processing, determining trends and identifying malicious activity.

Teams looking at how to use machine learning need to consider different methods, suggested Mark Russinovich, chief technology officer, Microsoft Azure, at the AFCEA Defensive Cyber Operations Symposium (DCOS) in Baltimore on May 17.

May 16, 2018
By Kaitlyn Cotter
Panelists discuss STEM education and training cyber warfighters during a panel at the Defensive Cyber Operations Symposium.

Raising the bar for STEM education comes through practice, competition and a culture shift to help prepare the next generation of defense leaders. It’s less about how many hours of STEM courses or what is the right age to engage kids in STEM and more of a focus on how to create access to opportunities in a way that they can connect with for the long term.

May 16, 2018
By Beverly Cooper
Panelists discuss women in the cyber workforce during a session at the Defensive Cyber Security Symposium.

Between 1.5 and 3 million cyber professionals will be needed worldwide by the year 2020 according to various studies. However, the majority of individuals currently entering the field are male; estimates are only 5 percent to 11 percent of professionals entering technical fields are women on a global basis. It is critical to bring more women into cyber fields not only to fortify the cyber workforce with more talent but also to apply the power of diversity that leads to better solutions.

Pages