• U.S. Cyber Command officials recently released a list of tough technical challenges areas, for which solutions may not yet exist. Credit: DR MANAGER/Shutterstock
     U.S. Cyber Command officials recently released a list of tough technical challenges areas, for which solutions may not yet exist. Credit: DR MANAGER/Shutterstock

U.S. Cyber Command Lists Technical Challenge Areas

The Cyber Edge
July 17, 2019
Posted by George I. Seffers
E-mail About the Author

Officials believe no solutions currently exist.


The U.S. Cyber Command has released a list of 39 challenge problems fitting under 12 categories: vulnerabilities, malware, analytics, implant, situational awareness, capability development, persona, hunt, mission management, attack, security and blockchain.

The document was released by the Cyber Command deputy director for technology, Berl “Mike” Thomas. “These Technical Challenge Problems are not requirements for which we anticipate solutions exist today. Rather, they are significant challenges which will require developers to use existing capabilities in novel ways, add new features, innovate, or drive new research,” the document says.

Among other challenges, Cyber Command says it needs a to patch vulnerabilities more quickly, rapidly reverse engineer malware, conduct open source research on malware, improve reporting on network activities, acquire effective automation and analytics, build and train machine learning models to help detect and counter malware infections, augment the cyber workforce with artificial intelligence, rapidly prototype solutions, recognize adversarial use of false personas, automate mission risk management, leverage commercial cloud solutions to conduct attacks, and conduct open source research to develop prototypes capable of countering adversarial use of cryptocurrency and cryptocurrency mining.

The full document can be found here.

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.


Departments: 

Share Your Thoughts:

Given 10 months, I can make all their pain points go away and design a revolutionary Systems Command Center (SCC) that will; patch vulnerabilities more quickly, rapidly reverse engineer malware, conduct open source research on malware, improve reporting on network activities, acquire effective automation and analytics, build and train machine learning models to help detect and counter malware infections, augment the cyber workforce with artificial intelligence, rapidly prototype solutions, recognize adversarial use of false personas, automate mission risk management, leverage commercial cloud solutions to conduct attacks, and conduct open source research to develop prototypes capable of countering adversarial use of cryptocurrency and cryptocurrency mining. The SCC would scale and not reply on over priced enterprise software.

Share Your Thoughts: