The US Navy CNO on Cyber Operations

02/13/2015
2015-02-13 Cyber is often confused with computer and information security. But it is really about cyber operations and within the context of rapidly evolving concepts of operations, as digital systems become dominant players in the evolution of war fighting capabilities. Our visit to CVN-78 highlighted the centrality of C2 and…

An Update on Chinese Cyber Espionage Activities: Putter Panda

06/30/2014
2014-06-30 Recently CrowdStrike released a report on recent Chinese cyber espionage activities. Monday, June 9, 2014, CrowdStrike publicly released a report on a group called Putter Panda, a cyber espionage actor that conducts operations from Shanghai, China, likely on behalf of the Chinese People’s Liberation Army (PLA) 3rd Department 12th Bureau…

New Capabilities, New Constraints Call For New Concepts of Operation

01/09/2013
2013-01-09 by Lt. General (Retired) David Deptula Whatever happens with sequestration, Pentagon planners are now struggling to fit the services’ myriad programs under a reduced budget topline. Advocates point to their particular project or personnel as vital to US warfighting capacity.  Technologists point to new capabilities that will allow us…

Lockheed Martin’s Next Gen Approach to Cybersecurity

12/17/2012
2012-12-17 By Murielle Delaporte The same way preserving minimum strategic stocks and oil reserves nationwide was one of the numerous Cold War challenges in the West, establishing a minimum guard against the 21st century  threat, i.e. cyber vulnerability, is on its way to becoming conventional wisdom as an unavoidable security requirement.…

The Department of Homeland Cyber Security: Does it Work?

05/27/2012
May 27, 2012: by Richard Weitz When the Department of Homeland Security (DHS) was established in March 2003, enhancing U.S. cybersecurity was designated as one of the new department’s primary goals. In signing the legislation creating DHS, President George W. Bush said, “The Department will gather and focus all-out efforts…