cyber

November 2, 2016
By Sandra Jontz
Panelists discuss readiness and training of U.S. military forces at MILCOM 2016. Photo by Mike Carpenter

Fifteen years of continuous combat on multiple global battlefields has made U.S. military troop readiness one of the most critical challenges facing the services and Defense Department, according to experts speaking at MILCOM 2016.

In spite of advances in communications, networking and other computer technologies, efforts to sustain troops and equipment have taken a toll on training in particular, making operational priorities and capability needs a highly relevant topic toward shaping the force of the future, said Maj. Gen. Bruce Crawford, USA, commanding general of the U.S. Army Communications-Electronics Command (CECOM).

November 1, 2016
By John M. Gilligan

Seventh in an ongoing series of articles

Rapid down selection, which narrows the field of potential bidders, has dramatically accelerated government acquisition efforts and can be applied to cyber contracting. It must be done early in the acquisition process, well before a formal request for proposal (RFP) and preferably long before a draft RFP. Otherwise, companies already may have invested considerable resources in pursuing an opportunity and will be reluctant to forgo their activities.

October 19, 2016
By Julianne Simpson

National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity; provide them with tools and resources needed to stay safe online; and increase the resiliency of the nation in the event of a cyber incident. This week’s theme is “Recognizing and Combating Cybercrime.”

October 18, 2016
 

NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency launched yesterday an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes. The final report from RAND Corporation is due in January.

October 14, 2016
By Robert K. Ackerman

Last in a four-part series on election cyber vulnerabilities.

Standardizing voter registration processes, voting machines and vote tabulation is the key to eliminating most vulnerabilities plaguing U.S. elections, according to several cybersecurity experts. These standardizations would embed security, enable backups and eliminate many backdoors through which hackers and vote fraudsters currently can warp the results of an election.

October 13, 2016
By Robert K. Ackerman

Third in a four-part series on election cyber vulnerabilities.

October 12, 2016
By Robert K. Ackerman

Second in a four-part series on election cyber vulnerabilities.

October 12, 2016
By Julianne Simpson

Being a victim of a cyber attack, either as an individual or business, can not only wreak havoc through major inconvenience and annoyance, but can also lead to financial ruin and can potentially threaten a victim’s reputation and safety.

October 11, 2016
By Robert K. Ackerman

This is the first of a four-part series, based on interviews with private sector cybersecurity experts, on the vulnerability of U.S. elections to cyberspace intrusion. The next three parts will focus on voting machines, vote tabulation and potential solutions to existing and future challenges.

October 11, 2016
By Aubrey Merchant-Dest

Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. As highlighted in last week’s blog, it takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.

September 26, 2016
By George I. Seffers
Col. Dean Fox, USAF (Ret.), counts international relationship building as one of the highlights of his military career.

The After Active Duty blog series examines the challenges, rewards and lessons learned for those who have transitioned from active duty to the private sector and the role AFCEA played in this progression.

Col. Dean Fox, USAF (Ret.), executive vice president for cybersecurity, AECOM, has done a lot of building of one sort or another throughout his active-duty career and afterward.

September 16, 2016
 

Raytheon Co., Dulles, Virginia, is being awarded a $98,090,785 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract (N66001-16-D-0442) to provide cyberspace science, research, engineering, and technology integration. Support includes technology assessment, development and transition; requirements analysis; systems engineering; operational and technical support; experimentation support; hardware and software development and prototyping; modeling and simulation; training; and security engineering/cybersecurity. This three-year contract includes one two-year option ordering period which, if exercised, would bring the potential value of this contract to $165,924,878.

September 12, 2016
By George I. Seffers
Now-retired Lt. Gen. Michael Basla, USAF, recalls the transition from signal to cyber.

The After Active Duty blog series examines the challenges, rewards and lessons learned for those who have transitioned from active duty to the private sector and the role AFCEA played in this progression.

Lt. Gen. Michael Basla, USAF (Ret.), saw a lot of changes during his military career. And he helped bring about some changes, too.

September 7, 2016
By Sandra Jontz
Director of National Intelligence James Clapper speaks at the Intelligence & National Security Summit. Photo by Herman Farrer Photography

Cybersecurity will remain as much of a challenge for the next administration as it has been for the current White House, especially in light of the constant barrage of cyber attacks from nation states, Director of National Intelligence James Clapper said Wednesday.

“The Russians hack our systems all the time, not just government but corporate and personal systems,” Clapper said on the inaugural day of at the Intelligence & National Security Summit (INSS) in Washington, D.C. The two-day conference, sponsored by AFCEA International and the Intelligence and National Security Alliance (INSA), runs through Thursday.

September 1, 2016
By Michael Del Vecchio and Aaron Moore

The emergence of cyber as a battlespace domain has changed the formula for intelligence gathering as well as warfighting. No longer can any form of the traditional intelligence architecture guarantee national security superiority. Just as weapon systems needed to accommodate new technologies, the intelligence community now must leverage the trinity of sensors, big data and cyber. 

August 24, 2016
 

Booz Allen Hamilton, McLean, Virginia (N00189-16-D-Z039); Lockheed Martin Missiles and Fire Control, Orlando, Florida (N00189-16-D-Z040); Science Applications International Corp., McLean, Virginia (N00189-16-D-Z041); Leidos Inc., Reston, Virginia (N00189-16-D-Z042); and Deloitte Consulting LLP, Arlington, Virginia (N00189-16-D-Z043), are being awarded a combined estimated $155,770,425 multiple award, indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee, firm-fixed-price task orders contract to obtain analytical, engineering a

August 2, 2016
By George I. Seffers
Lt. Gen. Ben Hodges, USA, commander, U.S. Army Europe, speaks to the attendees of TechNet Augusta via video teleconference.

AFCEA TechNet Augusta 2016
The SIGNAL Magazine Online Show Daily, Day 1

Quote of the Day:
“What we’ve observed them do is employ the full-range of information warfare capabilities to effectively find and fix their opponents. And then they finish them with long-range fires and combined arms maneuvers.” —Maj. Gen. Stephen Fogarty, commander, U.S. Army Cyber Center of Excellence

August 10, 2016
By Sandra Jontz
Nischit Vaidya (c), stands with his mother Mira Vaidya and father Niranjan Vaidya. Vaidya started a scholarship in his parents' names for cyber students at Capitol Technology University. Two students, a male and a female, will receive $1,000 each this fall. Photo courtesy Nischit Vaidya.

When students studying cybersecurity return to Capitol Technology University in Maryland this fall, cash scholarships donated by a former adjunct professor will aid at least two of them.

Nischit Vaidya, president and CEO of Argotis, is driven by a love of education and a desire to give back to his community. The new scholarship program—created in his parents' names—accomplishes that quest and provides a legacy honoring his parents, who endured years of hard work and worry to see their son succeed, he says. “For me, the biggest thing is my mom and dad.”

August 9, 2016
By Robert K. Ackerman
The SANS Institute’s VetSuccess program aims to move veterans into private sector cybersecurity jobs via targeted training and corporate sponsorships.

A private cybersecurity institute is plucking U.S. veterans with related experience, training them and placing them with commercial firms where they can help develop solutions that ultimately could benefit their former services. Government and the military increasingly are calling on industry to provide them with effective cybersecurity, and this program aims to tap the expertise of former military cyber warriors as part of that private sector effort.

August 4, 2016
By George I. Seffers
Panelists discuss requirements for innovative solutions, primarily in the cyber realm, at AFCEA TechNet Augusta 2016.

AFCEA TechNet Augusta 2016
The SIGNAL Magazine Online Show Daily, Day 3

Quote of the Day:
“We need a network environment where cybersecurity and cyber situational awareness is, in real time, capable of automated response, reacting at machine speed, self-diagnosing and self-healing.”—Gen. Dennis Via, USA, commander, Army Materiel Command

Officials with the Army’s Materiel Command (AMC) have initiated discussions with Army Cyber Command officials to see if the command can play a greater role in the cyber arena, according to Gen. Dennis Via, USA, AMC commander.

Pages