In this Game Changer article, we discuss how Internet Operations Management addresses the issue of centralized visibility and operational control.
By Breaking DefenseThe unclassified summary is short and vague, but we estimate 38 percent could be for offensive cyber warfare, 49 percent is undoubtedly defensive, and 13 percent is for forward defense in allied nations’ cyberspace.
By Sydney J. Freedberg Jr.JRSS is not secure enough so DoD data is at risk. Operators don’t have the tools they need to properly monitor and troubleshoot the system and the training to run it properly.
By Barry RosenbergDISA has identified 46 factors that could be used to help it get rid of passwords on your mobile device, including gait, the way you swipe, and how you hold your phone or tablet.
By Barry RosenbergThe military needs a globe-spanning network to counter threats that no single theater command can cope with. That takes more than just technology.
By Sydney J. Freedberg Jr.This year promises to be a year of big changes in how the Defense Department does Cyber — and leaders are warning staffers that it’s not going to be business as usual.
By Sydney J. Freedberg Jr.AFA: The Air Force wants artificial intelligence to track and react to cyber and electronic threats, to update countermeasures against enemy hackers, radars, and missiles faster than human minds can manage. But first you have to fix the basics. Today, the Department Of Defense Information Network (DODIN) is really not a single network, but a…
By Sydney J. Freedberg Jr.TYSON’S CORNER: “Unity of command” is a classic principle of war. As the US military struggles to improve cybersecurity against relentless Russian, Chinese, and other attacks, however, it’s finding the complex interconnectedness of computer networks complicate the chain of command. If the tech guys urgently need to shut a system down — say, because it’s…
By Sydney J. Freedberg Jr.GEORGETOWN: Four days after Defense Secretary Ash Carter launched the Pentagon’s new cyber strategy, experts and officials offered a grim picture of the global threat. The threat is metastasizing in ways that will require new kinds of defenses — even while many US companies and government agencies lag on basic cybersecurity measures. “The Chinese in particular are…
By Sydney J. Freedberg Jr.[UPDATED with Central Command statement on Twitter/YouTube hack] CRYSTAL CITY: There’s a new cyber sheriff in town — and none too soon. When the Pentagon’s social media accounts get hacked, as they did today, it’s acutely embarrassing. When the military’s internal networks get hacked, however, it’s potentially lethal. But the Defense Department doesn’t have a single organization…
By Sydney J. Freedberg Jr.