cyber

August 1, 2021
By Shaun Waterman
Airman 1st Class William King, USAF, technician, 352nd Special Operations Support Squadron, troubleshoots a modem connected to a parabolic dish in August, at RAF Mildenhall, England. JADC2 relies on globe-spanning high bandwidth links like these. U.S. Air Force photo by Airman 1st Class Joseph Barron

Earlier this year, Defense Secretary Lloyd Austin signed off on the U.S. Defense Department’s first-ever strategy for Joint All-Domain Command and Control, or JADC2, giving his imprimatur to an ambitious vision of a fully networked U.S. military.

JADC2 aims to provide rear-echelon commanders with continuous connectivity to front-line sensors, providing real-time data and offering an unassailable decision advantage to U.S. forces.

On the digitally managed battlefield envisaged by JADC2, autonomous vehicles and networked weapons would be remotely controlled via cloud-based AI-enabled software, so that a coordinated attack by land, sea, air and cyber forces can be launched with the swipe of a finger.

August 1, 2021
By Cmdr. Erika De La Parra Gehlen, USN
National security objectives can only be achieved when the government and private sector work together. NSA

As China continues to threaten U.S. national security through a whole-of-society warfare strategy, a government-private sector partnership must be a fundamental component of the U.S. government’s approach to information advantage and countering China’s attacks.

August 1, 2021
By Jeremy Miller and Dawn Yankeelov
Workforce development must include education and training for cyber readiness.  Envato/mstandret

The small business sector must seize the day and immediately begin taking the steps necessary to implement tools for cyber resilience and cyber readiness. Scaling cybersecurity services, education and training are crucial to national security.

Regarding the cyber warfare landscape for 2021, the most critical group to secure is the small and midsize business sector (SMBs), particularly following the pandemic. When working with tech-specific organizations and the military, process management and a sense of purpose can overcome inertia and apathy until a financial loss appears.

August 1, 2021
 

“Never Trust, Always Verify”: that’s the essence of Zero Trust security. But to be effective, agencies need to validate more than just their users. Tanium can help you validate devices too.

With Tanium’s comprehensive endpoint visibility and control, you can collect real-time data to authenticate devices within zero-trust models. This will help close vulnerabilities, improve cyber hygiene and raise the barrier to entry into your network.

Tanium is the ideal partner for your Zero Trust journey. Visit Tanium.com to learn more.

July 27, 2021
By Maj. James Torrence, USA
While some tout the idea that U.S. forces could pre-emptively degrade their own technological capabilities in a peer, or near-peer conflict, doing so would lead to losing, says an Army signal officer. Credit: Andy Gin/Shutterstock

The novel 2034 by James Stavridis and Elliot Ackerman perpetuates a fundamental misunderstanding of how technology should be employed and managed in future conflicts.

The continuing narrative is that we should purposely degrade our systems in a conflict with a peer competitor because of the possibility of a degraded spectrum, cyber attacks, space-based detection and jamming. But if we preemptively degrade our technology in a peer conflict, we will lose.

In the novel, after a conflict with the Chinese Navy in which the U.S. technical systems were incapacitated, U.S. ships preemptively disabled “any interface with a computer, a GPS or [any interface] that could conceivably be accessed online.”

July 30, 2021
By Kimberly Underwood
The Defense Information Systems Agency’s Emerging Technology Directorate is beginning a new pilot program to look at how well artificial intelligence and machine learning can be applied to automate aspects of cyber defense. Credit: Shutterstock/cybrain

The Defense Information Systems Agency, known as DISA, is expanding its artificial intelligence (AI) efforts through a research agreement and a new pilot program. While both efforts are in the beginning stages, the agency is considering how to possibly apply the so-called AI capabilities to network defense—among other areas the agency is separately pursuing—as it conducts its daily 24/7 mission of protecting the Department of Defense Information Network, or DODIN.

The agency entered into a Cooperative Research and Development Agreement, or CRADA, with Vienna, Virginia-based software company NT Concepts to apply machine learning (ML) to defensive cyber operations.

July 22, 2021
By Kimberly Underwood
U.S. Air Force airmen at Andersen Air Force Base, Guam, work to refuel an F-35A Lighting II aircraft assigned to Eielson Air Force Base, Alaska during the Cope North exercise in February. The airmen were conducting agile combat employment, or ACE, training during the exercise. The service’s ACE operations, which aim to bring more agility, resiliency and deterrence in a near-peer competitive environment, will be supported by its zero-trust architecture platforms. Credit: Pacific Air Forces/Senior Airmen Jona

Led by the Air Combat Command, the U.S. Air Force is pursuing zero-trust architecture on a level not seen before. One of the service’s first main use cases applies the cybersecurity measure to the agile combat employment (ACE). ACE operations provide a more lean, agile and lethal force that can generate airpower from multiple locations. ACE requires a different kind of command and control (C2) environment, as well as advanced planning concepts and logistical supply line support.

July 1, 2021
By Robert K. Ackerman
Two U.S. Navy operations specialists stand watch aboard the USS Dwight D. Eisenhower. The Navy must provide cybersecurity for major systems aboard ships as well as for smaller logistical systems, all of which are targets for digital adversaries.  U.S. Navy photo

The U.S. Navy is moving ahead at full speed to equip its assets with effective cybersecurity. However, the diverse nature of those assets—some are city-size ships while others are small but vital systems—confound planners seeking to ensure interoperable security measures.

July 15, 2021
Interview by Mark Senell
Credit: Shutterstock/Olivier Le Moal

The digital transformation is no longer simply an enabler—it’s the “trunk of the tree” that provides the foundational structure for everything we do, according to Gen. Stanley A. McChrystal, USA (Ret.). “It shapes what we are and how we operate.”

July 1, 2021
By George Galdorisi and Sam Tangredi
A soldier wears virtual reality glasses; a graphic depiction of a chess set sits in the foreground.  Illustration created by NIWC Pacific

Winner of The Cyber Edge 2021 Writing Contest

Convincing senior defense decision makers to significantly invest in artificial intelligence capabilities that would add more value to the United States’ already digitized operational capabilities—particularly in the cyber domain—needs more than pronouncements that “AI can save the taxpayers money.” It requires a logical progression of defining the objective, identifying the need, demonstrating specific results, conducting comprehensive cost analysis and, particularly in the case of applications in the cyber domain, thoughtfully discussing resilience and deception.

By Samuel J. Richman
The vastly complex and subtle digital human network that spans civilian and military populations must be defended as rigorously as computer networks.  Shutterstock/Pop Tika

2nd Place in The Cyber Edge 2021 Writing Contest

The United States stands on the cusp of a future defined by great power competitions that will undoubtedly be characterized by broad, deep and subtle cyber warfare strategies and tactics. The nation must make a deliberate decision to defend the digital human attack surface effectively by blurring traditional battle lines and creating a combined homeland and external battlespace.

July 1, 2021
By Lt. Col. Ryan Kenny, USA
Defending digital ecosystems from information pollution data operators should be a mission the U.S. national security apparatus conducts.  Shutterstock/ NDE12019

3rd Place in The Cyber Edge 2021 Writing Contest

A military-age male left home and traveled through the city, unaware he was being surveilled. Those watching him knew his patterns and preferences. They collected his point of departure, route and destination to predict when he would be most vulnerable for attack. Arriving at a marketplace, he meandered through a few high-traffic areas. Passing down a quiet corridor, he finally provided a clear shot. His smartphone buzzed and its screen flashed: “Two-for-one sale at the nearby pretzel shop!” He was struck by a precision-guided advertisement.

July 1, 2021
By Maryann Lawlor
Gen. Paul M. Nakasone, USA, tells Army National Guard soldiers U.S. Cyber Command is only as good as all the components, including Active, Reserve and National Guard. Photo by Steven Stover, 780th Military Intelligence Brigade

Lessons learned in combating terrorist organizations such as ISIS have proved valuable to tailoring national defense techniques to use against cyber attacks from near-peer adversaries, including China and Russia. Speaking at West 2021, Gen. Paul M. Nakasone, USA, said recent experience demonstrates that the threats to data and networks has changed dramatically in scope, scale and sophistication.

June 29, 2021
By George I. Seffers
Navy SEALs conduct train in the Atlantic Ocean, May 29, 2019. Navy Special Warfare Command expects artificial intelligence to augment the human weapon system as well as unmanned systems. Credit: Navy Senior Chief Petty Officer Jayme Pastoric

The U.S. Navy Special Warfare Command seeks to conduct missions no one else can, and officials expect artificial intelligence and machine learning capabilities to assist in that effort, Rear Adm. Hugh Wyman Howard III, USN, the organization’s commander, told the audience today during the 2021 WEST virtual conference.

June 17, 2021
By Kimberly Underwood
Lt. Gen. James C. Slife, USAF, (c), commander, Air Force Special Operations Command, explains AFSOC history and capabilities to Lt. Gen. Timothy D. Haugh, USAF, commander 16th Air Force during a visit in April at Hurlburt Field, Florida. The Air Combat Command and 16th Air Force are working to further evolve the Air Force’s information warfare approach, now that it has successfully integrated capabilities into the two-year old Numbered Air Force. Credit: U.S. Air Force photo by Senior Ai

The U.S. Air Force’s Air Combat Command and the 16th Air Force are taking further steps to advance the service’s information warfare operations. Championed by Air Combat Command’s (ACC’s) so-called A2-6 leaders, the “accelerate information warfare” approach requires the correct data management strategy, the right teams and problem-centric operations, officers say.

June 16, 2021
By Robert K. Ackerman
Credit: Devis M/Shutterstock

NATO is increasing the amount of joint work on command and control (C2) systems as a result of increases in common funding, according to the alliance’s secretary general. Jens Stoltenberg told a media roundtable that “We are on the right track” as the allies are stepping up to meet changing challenges. These efforts include developing an offensive cyber capability and establishing a unified approach to China.

June 1, 2021
By Kimberly Underwood
In its pursuit of open architecture solutions, the U.S. Navy has made “great strides” in applying the Mission Computer Alternative (MCA) platform, which is a Hardware Open Systems Technologies- (HOST-) conforming mission computer. The service is currently testing the MCA/HOST platform in its E-2D Advanced Hawkeye tactical airborne early warning aircraft and in its T-45 training aircraft (above)—and is considering how to advance the solutions to other platforms.  U.S. Navy photo

The U.S. military is using open architecture platforms on a greater scale, deploying interchangeable hardware and software systems to its major weapon programs. In particular, the Navy’s Naval Air Systems Command, known as NAVAIR, and its Program Executive Office, Aviation Common Systems and Commercial Services, are increasingly using flexible “systems of systems” in many of its major aviation programs. The application of open architecture is allowing the Navy—and the Defense Department—to consolidate common resources, decrease risk, reuse software, enhance maintenance abilities, reduce costs and increase tactical options.

June 14, 2021
 
Credit: ZinetroN/Shutterstock

A delayed focus on IT modernization could create a gap between frequent high-impact cyber breaches and the U.S. Department of the Navy’s preparedness to address them. From the SolarWinds hack to ransomware, new cyber threats emerge almost weekly. Advances in technology to help defend against such threats occur so quickly that current acquisition and infrastructure programs cannot keep pace.

June 2, 2021
By Chris Souza
Cybersecurity grows more complex with the Cybersecurity Maturity Model Certification. Effective compliance begins with effective leadership. Credit: fizkes/Shutterstock

There’s little doubt that thanks to the influx of new government regulations around privacy and data security, requirements have become the primary area of focus for many defense industrial base and General Services Administration contractors.

June 1, 2021
By Mark Spangler
 Cyber program managers must review their plans to respond to today’s evolving threat environment.  Shutterstock

Cybersecurity program managers are facing the dilemma of appropriately balancing compliance with threat tracking and mitigation. Today, amidst the ever-growing problem of data breaches, organizations are investing in protection. But simply complying with security and privacy standards seldom means systems and data are automatically secure.

March 3, 2021
By Kimberly Underwood
Leaders discuss cyber workforce disparities during the AFCEATechNet Indo-Pacific conference on March 3.

The 35th annual AFCEA TechNet Indo-Pacific conference featured a panel with top female leaders addressing cybersecurity workforce issues. Having ever-present cybersecurity training, reaching a younger audience on their level and leveraging women who may be seeking a second career are all ways to close the cybersecurity workforce gaps, the leaders said.

June 1, 2021
By George I. Seffers
Using virtual reality, soldiers from Fort Sill, Oklahoma, get a look at components of the Army’s new prototype Long Range Hypersonic Weapon and a chance to influence how the system is designed. In the future, units may use 3D printers to build their own virtual reality headsets.  U.S. Army

The personnel within the Realities Lab at the Army Cyber Institute located at West Point explore every aspect of extended reality technologies, developing new tools, conducting studies and asking the hard questions.

The Realities Lab is dedicated to research in what is becoming known as extended reality, or XR, a term that includes augmented, virtual and mixed reality. Extended reality technologies offer a wide range of military uses, including realistic training available virtually anywhere, modeling and simulation for weapon system development, and actual situational awareness on the battlefield.

May 27, 2021
By Kimberly Underwood
Gen. Paul Nakasone, USA, commander, U.S. Cyber Command; director, National Security Agency; and chief, Central Security Service, pictured speaking in 2019 with cyber soldiers assigned Fort Meade, expects an increase in the number of cyber teams deployed at the request of foreign governments to help defend against cyber marauders. Credit: Steven Stover, 780th Military Intelligence Brigade (Cyber)

The U.S. Cyber Command, at the invitation of foreign governments, sends teams of cyber warriors overseas to aid in the search for, analysis of and protection against adversaries conducting cyber warfare.

While U.S. forces frequently deploy overseas, this is a different kind of military support. Instead of taking tanks, helicopters and ships, the U.S. military sends its cyber warriors, armed with their adroit offensive and defensive skills and digital tools.

May 25, 2021
By Kimberly Underwood
Operating for just about 7 months, the Analysis and Resilience Center for Systemic Risk, or ARC, has a unique role in helping to protect industry-owned assets that have implications to national security if attacked by cybermauraders. Credit: Shutterstock/xtock

Stood up last October—the Analysis and Resilience Center for Systemic Risk (ARC), a nonprofit, Arlington-Virginia-based organization—helps to protect the nation’s infrastructure by assessing the endemic cybersecurity risks to the critical energy, financial and other private sectors. A 2013 executive order identified some assets—on which the U.S. government relies but reside in the private sector—that if compromised by cyber attack could have a catastrophic impact on national security.

May 24, 2021
 
Cyber adversaries are creating a “wild west” environment in cyberspace where organizations must be aware of their security to protect themselves, said Gene Yoo, CEO of Resecurity Inc. Credit: Shutterstock

Recent cyber attacks against critical infrastructure such as the attack on Colonial Pipeline Co. has put cybersecurity in the spotlight.

But combating cyber adversaries is a broad area requiring significant amounts of human intelligence and a deep technical expertise to identify them, Gene Yoo, CEO of Resecurity Inc., told SIGNAL Magazine Editor-in-Chief Robert K. Ackerman during a SIGNAL Media Executive Video interview.

Adversaries come in different types, he added, noting that these range from part-time hacktivists to skilled professionals working for criminal organizations or state intelligence agencies.

May 19, 2021
By Robert K. Ackerman
 Credit: metamorworks/Shutterstock

Cyber education and training should begin not in college, not in secondary school, not in middle school, not in elementary school, but at home as soon as children are able to view or use social media, say some experts. This training is important not just to lay the groundwork for future cybersecurity professionals in a field starved for expertise, but also to instill good cyber hygiene habits that can be passed on to other family members.

By Kimberly Underwood
The 67th Cyberspace Wing of the U.S. Air Force is examining the concept of software factory-as-a-service that could aid in cyber space operations, reports Wing Commander Col. Jeffrey Phillips, USAF.

The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level. The wing has successfully proven its ability to operationalize on top of its duties to organize, train and equip, reported Col. Jeffrey Phillips, USAF, wing commander. The wing took action against Russia’s information warfare campaign over the last year, responded to the SolarWinds compromise and helped ensure the digital security of the 2020 election, Col. Phillips said during a May 18 presentation to the AFCEA Alamo Chapter.

May 19, 2021
 
Cloud-based security architectures can help federal agencies protect their infrastructure and manage change as it occurs, says Sean Frazier, federal chief security officer at Okta Inc. Credit: Shutterstock

As more federal agencies and businesses move to the cloud, managing their security needs in this new environment becomes critical. One way to do this is to implement zero-trust architectures as part of an identity cloud environment, said Sean Frazier, federal chief security officer at Okta Inc.

Zero-trust architecture, where it is assumed that the network is or will be compromised, is the latest phase of security development. This is important as the Defense Department modernizes its cloud-based systems under constant pressure from foreign cyber attacks.

May 18, 2021
By Kimberly Underwood
Marine Corps Chief Warrant Officer 4 Daniel Belew, USMC, academics officer, Marine Corps Communication-Electronics School, speaking at AFCEA’s TechNet Augusta Virtual Series on May 18, reports that the service is working to incorporate an “always-on feedback loop” in which incremental change is incorporated in the academic cycle.

The U.S. Navy and Marines Corps are harnessing virtual platforms and advanced methods to teach cyber and communications skills. In some cases, the services are looking to a “blended model” of instruction from both industry and military cyber experts that produces multitudes of trained personnel for a single investment. Additionally, to create a powerful cyber force, technical training needs to be as realistic as possible, with high-fidelity cyber training ranges that can meet high standards for mission rehearsals and training on a daily basis and can be accessed anywhere in the world. 

May 18, 2021
By Kimberly Underwood
The Army’s Cyber Center of Excellence (CCoE) at Fort Gordon, Georgia, is creating a new pilot program to allow soldiers to access training before deploying, when they are at their units or when they find they are lacking in a skill. It will also let managers know in which areas a soldier is strong, says incoming Command Chief Warrant Officer (CWO) at the CCoE, CWO 5 Paul Sankey, USA.

The U.S. Army is creating a pilot program for a limited number of Signal Warrant Officers to build certain skills that the service is identifying as being crucial for the future digital battlefield. The program, currently being developed by the Army’s Cyber Center of Excellence (CCoE) at Fort Gordon, Georgia, will feature an online training platform for soldiers to access on-demand education when needed to support future signal, cyber and electronic warfare operations.

May 18, 2021
By Robert K. Ackerman
Lt. Gen. Stephen G. Fogarty, USA, commander, U.S. Army Cyber Command, delivers the opening keynote in Episode Three of the TechNet Augusta Virtual Solutions Series.

The U.S. Army is girding for battle in cyberspace by assembling a skilled force that it hopes will make the difference in the event of a conflict, its cyber commander stated. This force aims to be the decisive factor in any conflict in that domain.

The Army cyber workforce was the focus of the opening session for episode three of the TechNet Augusta Virtual Solutions Series, being held May 18-19. Delivering the opening keynote was Lt. Gen. Stephen G. Fogarty, USA, commander, U.S. Army Cyber Command, who wasted no words in describing the importance of the human factor in cyber operations.

May 18, 2021
By George I. Seffers
STEM education is a vital part of attracting a cyber-savvy workforce for civil and military service. Credit: Somjai Jathieng/Shutterstock

Every cyber warrior can be a cyber recruiter, according to panelists at the AFCEA TechNet Augusta Virtual Event Series.
 
The United States faces a severe shortage in cyber personnel and in students willing to enter the cyber workforce. That shortage is even more acute in the government and the military, where talented personnel are often recruited by industry for higher pay and other incentives.
 

May 13, 2021
By Kimberly Underwood
Making ransom payments in cyber attacks only fuels the business model of malicious actors, warns the acting director of the Cybersecurity and Infrastructure Security Agency, Brandon Wales, speaking to reporters on May 13.

The Cybersecurity and Infrastructure Security Agency, or CISA, the nation’s lead federal agency for protecting government networks and critical infrastructure against cybersecurity threats, reminded agencies and the private sector not to succumb to paying ransoms in cyber attacks and to take much greater steps to shore up any vulnerabilities. “As last week’s ransomware attack against the Colonial Pipeline and recent intrusions impacting federal agencies demonstrate, our nation faces constant cyber threats from nation states and criminal groups alike,” said Brandon Wales, CISA’s acting director in a May 13 statement. 

May 13, 2021
By Beverly Cooper
Credit: Shutterstock/insta_photos

Development of a new federal service academy, established to educate a robust digital civil servant workforce, is the recommendation of the AFCEA Cyber Committee in a recent white paper “Establishing a Federal Digital Service Academy.” In echoing the sentiments of various commissions and thought leaders over the past four years, the committee is calling on President Biden to sign an executive order and begin the process

May 13, 2021
By Kimberly Underwood
The new cybersecurity executive order from the White House calls for the federal government’s increased use of multifactor authentication, encryption, endpoint detection response, breach logging, zero-trust architecture and cloud computing, according to a senior administration official. Credit: Shutterstock/Andrea Izzotti

In an effort to increase critical infrastructure cybersecurity and better protect federal networks, President Joseph Biden signed an executive order on May 12. It includes provisions to improve information sharing between industry and the U.S. government, overhaul federal cybersecurity standards, spur the further use of cloud computing and zero trust architecture, and mandate the use of multifactor authentication and encryption. Amongst other measures, the executive order establishes a Cybersecurity Safety Review Board that would dissect a significant cyber incident and make recommendations for action.

May 1, 2021
By Kevin Tonkin
U.S. Marines assigned to the Defensive Cyberspace Operations–Internal Defensive Measures Company, 9th Communications Battalion, review network configurations in the current operations tent at Marine Corps Base, Camp Pendleton. The company executes defensive cyberspace operations for the Marine Corps Enterprise Network. Photo by Cpl. Cutler Brice, USMC, I Marine Expeditionary Force

The massive cyber attack on the United States via information technology vendor SolarWinds continues to send shockwaves through the departments of Defense, State and Homeland Security as well as other agencies. Damage assessments are ongoing. If the U.S. government in general and Defense Department in particular are to successfully defend against attacks by well-funded, patient and highly motivated enemies, they will need to change their approach to defending their networks and systems.

May 1, 2021
By Michael Grebb, David Nolan and Gabriel Martinez
Managing access to information systems involving data about drug overdoses, federal threats, criminal justice information, geographical information system (GIS) mapping or physical access to a crime scene is central to today’s public safety information technology environment. The Tennessee Dangerous Drug Task Force is part of a pilot program to advance federated ICAM initiatives for first responders. Credit: Shutterstock/Victor Yang

Public safety agencies are seeking ways to reliably grant mission-critical information access to authorized users while also ensuring security and data integrity. Technical pilot projects sponsored by the Office of the Director of National Intelligence and the Cybersecurity and Infrastructure Security Agency demonstrated cross-domain federated identity, credential and access management for secure information sharing for first responders in Texas and Tennessee.

May 1, 2021
By Michael Campanelli

Before 1957, man had never placed a single object in space. Soon, tens of thousands of new artificial satellites will circle the Earth. Beyond a change in the sheer volume of satellites in space, the actors at center stage today are fundamentally different: a shift from humans and hardware to software and shoebox satellites.

A new space race is dawning. Luckily, the United States has an edge against competitors like China and Russia if it can keep it.

April 28, 2021
 
Getting privileged access management right involves making sure the right security tools are in place and determining that they are easy to use and can interoperate with legacy software and systems, says Ross Johnson, director of federal sales for Thycotic Software Ltd. Credit:Shutterstock

The recent wave of high-profile cyber attacks on federal government agencies and the businesses that support them has gotten organizations thinking about security. A key part of any organization’s security strategy is access management—determining who can access certain kinds of information and resources and when and/or where they can do so.

But determining where to start can often be delayed by indecision due to over-analysis and caution, explains Ross Johnson, director of federal sales for Thycotic Software Ltd. The first and most important thing an organization can do is to make the decision to take inventory of all their data assets.

April 20, 2021
By Kimberly Underwood
Leaders from the Defense Information Systems Agency and the Joint Force Headquarters Department of Defense Information Network, including Gen. Garret Yee, Gen. Paul Fredenburg and Joe Wassel, found that the close working relationship of the two organizations was crucial in responding to the SolarWinds malware attack.

Facing an unprecedented malicious cyber event, the Defense Information Systems Agency, known as DISA, and the Joint Force Headquarters Department of Defense Information Network, or JFHQ-DODIN, sprang into action, leaning on their respective round-the-clock operations, their supply chain management postures, and relying on its industry, Defense Department and government partnerships, leaders say.

April 20, 2021
 
Zero trust architecture isn’t a single architecture, nor is it a single solution that can be purchased, but an interrelated set of old and new technologies and methods working together, said Don Maclean, chief cybersecurity technologist for DLT Solutions.

Many federal government agencies are interested in improving their cybersecurity by moving to a zero trust architecture model. But such a move, while very beneficial to the organization, is a complex and involved process that requires some fundamental changes in how security and operations are approached, says Don Maclean, chief cybersecurity technologist for DLT Solutions.

Zero trust architecture is a cybersecurity concept that assumes a network is or will be compromised and takes steps to protect data at every potential point of access.

April 19, 2021
 
Industry can help the DOD with complex technology acquisition and deployment projects by providing services and expertise, said Dana Barnes, senior vice president of public sector at Palo Alto Networks. Credit: Shutterstock

Cybersecurity in the federal government, especially for the Department of Defense, is a complex dance between agencies and commercial partners. To get things right, companies working with the government need to be adaptable and resilient in helping government customers meet their mission goals, said Dana Barnes, senior vice president of public sector at Palo Alto Networks.

April 15, 2021
By Robert K. Ackerman
Credit: William Potter/Shutterstock

From the virtual realm to zero gravity, China is posing a serious threat to U.S. national security that goes far beyond the Earth. With a strategic thrust designed to buttress and expand the reach of the Chinese Communist Party, the country is engaged in a long march for control that currently includes operations inside the United States as well as in orbit and beyond.

April 14, 2021
 
The DOD is concerned about the cybersecurity of additive manufacturing systems, said David Benhaim, co-founder and chief technology officer for Markforged. Credit: Shutterstock

The U.S. Department of Defense is looking at additive manufacturing technologies to rapidly prototype and build equipment components and increasingly, to potentially make replacement parts in the field.

While additive manufacturing, the ability to build plastic and metal parts by depositing a fine spray of material, has been used by the aerospace and defense sectors for some time, the capability is now becoming more portable. One such project is the U.S. Marine Corps’ X-Fab effort, which uses a shipping container loaded with compact additive manufacturing equipment that can be shipped anywhere in the world to make replacement parts.

April 9, 2021
By Robert K. Ackerman
A communications tower for military 5G rises above a forest. Several challenges loom as the U.S. Defense Department strives to implement 5G into the force. Credit: M.Moira/Shutterstock

The revolutionary advantages offered by defense use of 5G technology could be undone if the United States doesn’t begin now to meet and overcome a set of challenges, said an expert from the National Security Agency (NSA). These challenges range from developing effective security measures to ensuring the supply chain is not contaminated by parts made by foreign adversaries.

April 6, 2021
 

Enlighten IT Consulting LLC, Linthicum Heights, Maryland, has been awarded a $66,294,372 firm-fixed-price contract to provide Enterprise Logging Ingest and Cyber Situational Awareness Refinery (ELICSAR) Big Data Platform (BDP) to provide Air Force enterprise data analytics and further development and deployment of ELICSAR in the unclassified, secret, and top secret domains. ELICSAR BDP is a government-owned, cloud-based platform that collects data and enables complex analytics to identify advanced cyber threats. Work will be performed in Linthicum Heights, Maryland, and is expected to be completed March 31, 2024. This award is the result of a competitive acquisition using AFWERX Commercial Solutions Opening authority.

April 6, 2021
Posted by: George I. Seffers
A newly formed industry advisory council will allow small and large businesses to provide feedback on the CMMC. Credit: Gorodenkoff/Shutterstock

The Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB), the sole authoritative source for operationalizing CMMC assessments and training by the U.S. Defense Department, has announced the formation of a cybersecurity Industry Advisory Council’s (IAC).

The CMMC-AB IAC mission is to provide a unified voice as representatives of organizations seeking certification to provide to the Defense Department and the accreditation board feedback, input and recommendations for implementing the CMMC.

April 1, 2021
By George I. Seffers
With the National Institute of Standards and Technology expected next year to select quantum-resistant algorithms for encryption and for digital signatures, an NSA official warns that departments and agencies should begin preparing now to protect national security systems in the quantum era. Credit: sakkmesterke/Shutterstock

The national security community needs to prepare now for the possibility that U.S. adversaries could develop and deploy quantum computers, which would render useless most conventional encryption algorithms, says Adrian Stanger, senior cryptographic authority, Cybersecurity Directorate, National Security Agency (NSA).

April 1, 2021
By Matt Toth and Richard Chitamitre
Training sessions, such as Cyber Shield 19, provide cybersecurity analysts opportunities to train, exchange best practices and test their cyber mettle. Credit: Army Staff Sgt. George B. Davis

The nature of military permanent change of station assignments can create gaps in the U.S. Defense Department’s protected posture to cyber assets. The current approach allows valuable institutional knowledge literally to walk out the door, often being replaced with inadequately prepared personnel walking in. This practice runs contrary to the Pentagon’s stated strategic goals that aim at building and maintaining a skilled workforce rather than solely acquiring new tools.

April 1, 2021
By Miroslav Nečas
The NATO Ministers of Defence meet in February to prepare for its summit later this year. Among the topics socially distanced attendees discussed were progress on burden sharing and missions in Afghanistan and Iraq. Credit: NATO

NATO is at risk of losing its technology edge because of emerging and disruptive technologies increasingly developed within the civil sector. The growth of peer competitors’ determination, especially China, and the decline of technology education in Western countries are eroding the advantage they once skillfully held.

To address this state of affairs, the organization’s defense ministers are examining a number of activities. As a part of this initiative, the NATO Industrial Advisory Group (NIAG) conducted a study to provide the industry view of the implications of emerging and disruptive technologies (EDTs) and Chinese advances in defense operations and military capability development.