presented by
<i>Game Changer</i>: Internet Operations Management is well suited to military networks

<i>Game Changer</i>: Internet Operations Management is well suited to military networks
Game Changer: Internet Operations Management is well suited to military networks

In this Game Changer article, we discuss how Internet Operations Management addresses the issue of centralized visibility and operational control.

Cyber Command Seeks $106M For Unfunded Priorities Worldwide

Cyber Command Seeks $106M For Unfunded Priorities Worldwide
Cyber Command Seeks $106M For Unfunded Priorities Worldwide

The unclassified summary is short and vague, but we estimate 38 percent could be for offensive cyber warfare, 49 percent is undoubtedly defensive, and 13 percent is for forward defense in allied nations’ cyberspace.

Troubled JRSS Cyber System Exposes DoD Data, Says DoD IG

Troubled JRSS Cyber System Exposes DoD Data, Says DoD IG
Troubled JRSS Cyber System Exposes DoD Data, Says DoD IG

JRSS is not secure enough so DoD data is at risk. Operators don’t have the tools they need to properly monitor and troubleshoot the system and the training to run it properly.

End Of Passwords: DISA Tests Walkabout Identity System

DISA has identified 46 factors that could be used to help it get rid of passwords on your mobile device, including gait, the way you swipe, and how you hold your phone or tablet.

How To Wage Global Cyber War: Nakasone, Norton, & Deasy

How To Wage Global Cyber War: Nakasone, Norton, & Deasy
How To Wage Global Cyber War: Nakasone, Norton, & Deasy

The military needs a globe-spanning network to counter threats that no single theater command can cope with. That takes more than just technology.

Common Cyber Standards Will Steamroller Hold-Outs: DoD Officials

Common Cyber Standards Will Steamroller Hold-Outs: DoD Officials
Common Cyber Standards Will Steamroller Hold-Outs: DoD Officials

This year promises to be a year of big changes in how the Defense Department does Cyber — and leaders are warning staffers that it’s not going to be business as usual.

Artificial Intelligence For Air Force: Cyber & Electronic Warfare

Artificial Intelligence For Air Force: Cyber & Electronic Warfare
Artificial Intelligence For Air Force: Cyber & Electronic Warfare

AFA: The Air Force wants artificial intelligence to track and react to cyber and electronic threats, to update countermeasures against enemy hackers, radars, and missiles faster than human minds can manage. But first you have to fix the basics. Today, the Department Of Defense Information Network (DODIN) is really not a single network, but a…

Who Commands In Cyberspace As New HQ Expands?

Who Commands In Cyberspace As New HQ Expands?
Who Commands In Cyberspace As New HQ Expands?

TYSON’S CORNER: “Unity of command” is a classic principle of war. As the US military struggles to improve cybersecurity against relentless Russian, Chinese, and other attacks, however, it’s finding the complex interconnectedness of computer networks complicate the chain of command. If the tech guys urgently need to shut a system down — say, because it’s…

Thin Clients & Persistent Threats: Coping With The New Cyber Dangers

Thin Clients & Persistent Threats: Coping With The New Cyber Dangers
Thin Clients & Persistent Threats: Coping With The New Cyber Dangers

GEORGETOWN: Four days after Defense Secretary Ash Carter launched the Pentagon’s new cyber strategy, experts and officials offered a grim picture of the global threat. The threat is metastasizing in ways that will require new kinds of defenses — even while many US companies and government agencies lag on basic cybersecurity measures. “The Chinese in particular are…

DISA, CYBERCOM Stand Up New Cyber HQ

DISA, CYBERCOM Stand Up New Cyber HQ
DISA, CYBERCOM Stand Up New Cyber HQ

[UPDATED with Central Command statement on Twitter/YouTube hack] CRYSTAL CITY: There’s a new cyber sheriff in town — and none too soon. When the Pentagon’s social media accounts get hacked, as they did today, it’s acutely embarrassing. When the military’s internal networks get hacked, however, it’s potentially lethal. But the Defense Department doesn’t have a single organization…