The Department of Homeland Security Science and Technology (S&T) Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.
Lockheed Martin Corp., Orlando, Florida, was awarded a $7,832,701 modification (P00022) to contract W900KK-14-C-0020 to accommodate increased demand for cyber training and test event operations at the national cyber range which is operated and sustained by Lockheed Martin. The increased levels of support will provide the ability to scale up technical capacity and to support the increased tempo of cyber event operations. Work will be performed in Orlando, Florida, with an estimated completion date of May 25, 2019. Fiscal 2017 research, development, test and evaluation funds in the amount of $5,309,700 were obligated at the time of the award.
Executive Protection Systems LLC, doing business as RavenTek Solutions, Chantilly, Virginia, is being awarded a $19,211,795 indefinite-delivery/indefinite-quantity, firm-fixed-price contract (N66001-17-D-0041) for cyber and information technology training in support of the Marine Corps Forces Cyber Command.
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities.
Terry Halvorsen, U.S. Defense Department chief information officer, told the AFCEA TechNet Asia-Pacific audience he is concerned about the cyber threat posed by insiders, but also warned against limiting employees’ sense of freedom.
Cindy Moran, former director for network services at the Defense Information Systems Agency (DISA), told the audience at the AFCEA TechNet Asia-Pacific conference in Honolulu that it is time to build networks for maximum performance and to find other ways to build in security.
“We as a culture have designed and built our networks to protect our information and our data since we started building networks. We’ve never built them to be optimal from a network perspective,” said Moran, who is now president and managing partner of Pikes Way LLC. “With growth and change as much as we’ve got going in here, we no longer have that luxury.”
U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.
Assured Information Security Inc., Rome, New York (FA8750-12-D-0002); CACI Technologies Inc., Chantilly, Virginia (FA8750-12-D-0005); Global InfoTek Inc., Reston, Virginia (FA8750-12-D-0003); Harris Corp., Herndon, Virginia (FA8750-12-D-0006); L-3 National Security Solutions Inc., Reston, Virginia (FA8750-12-D-0007); and Radiance Technologies Inc., Huntsville, Alabama (FA8750-12-D-0004), have been awarded a combined $200,000,000 basic contract modification for additional in-scope activities.
Fifteen years of continuous combat on multiple global battlefields has made U.S. military troop readiness one of the most critical challenges facing the services and Defense Department, according to experts speaking at MILCOM 2016.
In spite of advances in communications, networking and other computer technologies, efforts to sustain troops and equipment have taken a toll on training in particular, making operational priorities and capability needs a highly relevant topic toward shaping the force of the future, said Maj. Gen. Bruce Crawford, USA, commanding general of the U.S. Army Communications-Electronics Command (CECOM).
Seventh in an ongoing series of articles
Rapid down selection, which narrows the field of potential bidders, has dramatically accelerated government acquisition efforts and can be applied to cyber contracting. It must be done early in the acquisition process, well before a formal request for proposal (RFP) and preferably long before a draft RFP. Otherwise, companies already may have invested considerable resources in pursuing an opportunity and will be reluctant to forgo their activities.
National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity; provide them with tools and resources needed to stay safe online; and increase the resiliency of the nation in the event of a cyber incident. This week’s theme is “Recognizing and Combating Cybercrime.”
NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency launched yesterday an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes. The final report from RAND Corporation is due in January.
Last in a four-part series on election cyber vulnerabilities.
Standardizing voter registration processes, voting machines and vote tabulation is the key to eliminating most vulnerabilities plaguing U.S. elections, according to several cybersecurity experts. These standardizations would embed security, enable backups and eliminate many backdoors through which hackers and vote fraudsters currently can warp the results of an election.
Third in a four-part series on election cyber vulnerabilities.
Second in a four-part series on election cyber vulnerabilities.
This is the first of a four-part series, based on interviews with private sector cybersecurity experts, on the vulnerability of U.S. elections to cyberspace intrusion. The next three parts will focus on voting machines, vote tabulation and potential solutions to existing and future challenges.
Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. As highlighted in last week’s blog, it takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.
The After Active Duty blog series examines the challenges, rewards and lessons learned for those who have transitioned from active duty to the private sector and the role AFCEA played in this progression.
Col. Dean Fox, USAF (Ret.), executive vice president for cybersecurity, AECOM, has done a lot of building of one sort or another throughout his active-duty career and afterward.