For 10 weeks, we have addressed the issue of women in STEM and why many leave the field after working so hard to earn their college degrees. For 10 weeks, we've run features on prominent women who stuck with their careers in science, technology, engineering and math, despite some hurdles. For 10 weeks, salient points have reverberated as leaders talk about the sexual harassment, the pay gap, waning student interest and the need for mentors. But we're not done talking about it. Next month, AFCEA International hosts its first Women in STEM panel at TechNet Augusta to tackle the issue. You should join us.
Cybersecurity today is less about stopping adversaries from breaching networks and more about damage control once they get in, an adjustment that has government and businesses embracing a new trend that merges security and big data.
This confluence gives rise to a growing practice called threat hunting, the act of aggressively going after cyber adversaries rather than waiting to learn they have breached security perimeters.
While growing in popularity, a recent survey of security experts notes that a significant portion of threat hunting is still being performed ad hoc, negating benefits of a repeatable processes and a waste of resources in trying unverified methods that provide minimal value.
The Department of Homeland Security (DHS) may sometimes seem like a confused teenager, but it is growing and maturing and striving to make the country stronger, reports Russell Deyo, the DHS undersecretary for management.
The Department of Homeland Security (DHS) is taking steps to improve the Einstein system, which provides cyber situational awareness across government agencies.
The Einstein system was instrumental in helping to uncover the massive breach into the Office of Personnel and Management’s (OPM) networks, according to Phyllis Schneck, deputy under secretary for cybersecurity and communications, National Protection and Programs Directorate (NPPD), DHS.
In just a matter of weeks, the Defense Information Systems Agency (DISA) will open the process for requesting proposals for the next round in the U.S. Defense Department’s cloud services offering. DISA’s pre-solicitation notice serves as notification to industry of the upcoming request for proposal (RFP) package for DISA's milCloud 2, Phase 1 (m2P1) contract, a government-offered service that, while not a completely commercial cloud-based system, leverages commercial products.
Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium. Our service men and women have trust in each other, but they must have trust that we will provide the capabilities to keep them successful. Trust is the number one ingredient that will create or hinder innovation, he explained.
Gen. Hernandez is West Point Cyber Chair to the Army Cyber Institute and president of CyberLens LLC. He was the first commander of Army Cyber Command (ARCYBER).
LinQuest Corporation officials are now offering a new game-based technology that allows cyber analysts to view data in an immersive 3-D environment, which the company says allows quicker understanding of the data, saving users both time and money.
The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems. The virtual world includes video feeds, data feeds, web interfaces, data visualizations and analytical tools. Once the crisis is over, the virtual world and its super metadata can be archived into the cloud.
Ultra Electronics, 3eTI, will soon see its CyberFence solution being integrated into programmable logic controllers, which often are used for automation of critical infrastructure—telling a power generator when to turn on and off, for example. CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.
The U.S. Army last week completed an exercise designed to further define how the service adapts operationally to modern threats, including cyber attacks and electromagnetic warfare. During the exercise, the Army tested the cyber-electromagnetic activities (CEMA) cell concept within a brigade combat team and introduced new, yet-to-be-fielded technologies.
Cyber Defense Information Assurance, Round Rock, Texas, has been awarded a $11,473,390 modification (P00003) to previously awarded contract FA8773-15-C-0045 for the Air Force Intranet Control weapon system and the Department of Defense Joint Regional Security Stacks. Contractor will provide Air Force enterprise-level network management, optimized communications and defensive measures at the Air Force Information Network gateways. Air Force Intranet Control operates the Common User virtual private network mesh tying the components of the Air Force’s intranet together and protecting Air Force network traffic through encryption as it traverses public infrastructure.
History repeats itself: And the next-generation airframe might come as a bit of a surprise.
“They’re back,” said Thomas Kupiec, chief information security officer for SMS, as he shared as an example of two prototypes NASA is working on, complete with bulletproof skin and the potential for unmanned flight in the future.
But what is greatly different today from the first blimps of the 1890s is the need for cybersecurity, Kupiec shared during an afternoon panel discussion at AFCEA International’s inaugural TechNet Air 2016 symposium in San Antonio, which runs March 22-24.
Georgia Tech Research Institute (GTRI), Atlanta, is being awarded an $84,538,427 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for command, control, communications, computers, intelligence and cyberspace technology research in GTRI’s capacity as a Department of Defense university affiliated research center. Work will be performed in San Diego (90 percent) and Atlanta (10 percent), and is expected to be completed by February 28, 2021. No funds are being obligated at the time of award. Funds will be obligated as individual delivery orders are issued. This contract was a sole-source acquisition not competitively procured in accordance with 10 U.S.
President Barack Obama championed cybersecurity efforts Tuesday in seeking $19 billion for the cause as part of his fiscal year 2017 budget proposal. Additionally, he signed two executive orders to seek to strengthen government networks against cyber attacks while protecting personal information.
The budget proposal for FY17, which begins October 1, is a 35 percent increase over the current fiscal year.
The SIGNAL Magazine Online Show Daily, Day 3
Quote of the Day:
“Innovation is a contact sport; it is not for the weak of heart.”—Jay M. Cohen, principal, The Chertoff Group, former chief of naval research
The U.S. Navy is counting on industry and academia to generate new capabilities that can meet sea service needs rapidly in a dynamic threat picture. Achieving this goal effectively will require overcoming cultural inertia and an acquisition architecture that is stacked against speed and innovation.
In a complex world rife with a plethora of threats, North Korea looms as the worst, according to the former supreme allied commander Europe. Adm. James G. Stavridis, USN (Ret.), dean of The Fletcher School of Law and Diplomacy, described the Hermit Kingdom in harsh detail during his keynote address opening West 2016, being held in San Diego February 17-19.
“They have a young, untested, untried, morbidly obese leader that has nuclear weapons,” Stavridis said in referring to Kim Jong Un.
Since the 2009 fatal shootings of 13 people at Fort Hood by a U.S. Army major and psychiatrist and the leaks of some 750,000 classified and sensitive military documents to WikiLeaks by another soldier, the U.S. Defense Department has sought technology to give analysts an advantage in finding insider threats.
The need spread, and now federal agencies employ advanced analytics and cybersecurity solutions to protect against an ever-morphing landscape of breaches, from those outside firewalls to rogue or careless employees. One of those solutions is a product called Carbon.
If you have ever worked on a team, then you understand the intrinsic need for everyone to work from the same set of terms of references, or TORs—kind of a definitive dictionary. TORs are needed even if working internationally with team members who originate from nations that use the same language, such as English, the language of the early Germanic settlers—Angles, Saxons, Jutes—of Britain.
Director of National Intelligence, James Clapper, today announced the leaders of the Cyber Threat Intelligence Integration Center (CTIIC). Director Tonya Ugoretz will lead the center, with Maurice Bland as deputy and Office of the Director of National Intelligence (ODNI) Research Director Thomas Donahue as part of the team.
A year ago, President Obama directed Clapper to establish the CTIIC in a move to fuse intelligence collected from multiple agencies probing cyberthreats. The center serves to “connect the dots” regarding malicious foreign cyberthreats against the United States, according to an ODNI press release announcing the leaders.
Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. While in the recent past, mention of the words insider threat conjured up the likeness of Edward Snowden, the reality is much scarier. More often than not, insider threats result from innocent people making simple mistakes rather than the common misconception of malicious employees or whistleblowers.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced its first Innovation Other Transaction Solicitation (OTS) aimed at non-traditional performers such as technology startups to offer solutions to some of the toughest threats facing DHS and the homeland security mission. Awarded through Other Transaction Solicitation HSHQDC-16-R-B0005, the first call for proposals is looking for solutions to improve situational awareness and security measures for protecting