Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: J.J. Green
After Last week's high level meeting with India, the White House says India-United States defense cooperation and engagement has increased significantly over the past decade, in step with the overall deepening of India-U.S. relations. "We continue to work toward achieving the full vision of expanded defense cooperation set forth in the 2005 New Framework Agreement, " the White House said in a statement. The close U.S. relationship with India has been a point of contention for some in Pakistan --which the U.S. has also sought closer ties with. Pakistan and India have a long history of distrust.
Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.
How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.
Secretary of Defense Chuck Hagel participated in the U.S.-Gulf Cooperation Council (GCC) Strategic Cooperation Forum Thursday in New York along with Secretary of State John Kerry. During the meeting, Hagel reiterated the United States' commitment to the region and underscored how collaborative approaches toward regional defense made the Middle East more secure and stable. He also discussed recent progress on ballistic missile defense.
For the second time, the court-martial of a U.S. Army general facing sexual assault charges has been postponed. The trial of Brig. Gen. Jeffrey A. Sinclair had been scheduled to begin at Fort Bragg next Monday. It was announced Tuesday that military Judge Col. James Pohl rescheduled the trial for Jan. 7 after a request from Sinclair's defense team. Unresolved issues are being worked out according to his civilian lawyer.
The U.S. military is laying fiber-optic cable under water to connect Guantanamo Bay Naval Base in Cuba with Florida, and the Associated Press reports it "could someday extend it to the rest of Cuba,." Ronald Bechtold, chief information officer at the Pentagon, said Friday at the war crimes tribunal, the project would be finished in about two years and vastly improve communications between the naval base and the United States."
How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.
What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.
The Pentagon said Wednesday conducted the second test of the ship-based Aegis missile defense system in a week, firing two SM-3 missiles to intercept a single, complex separating target in space, the U.S. Defense Department said. According to DoD, the first SM-3 that was launched, successfully intercepted the target warhead. Raytheon said the second SM-3 was launched to test the system's ability to launch multiple missiles at one time against a threat. It was not intended to intercept the target.
Lawyers in the case at Guantanamo Bay are pressing their effort to put proceedings on hold until security problems with a computer network are fixed. The chief defense counsel for military commissions spent Wednesday testifying about her April order forbidding use of a Pentagon computer network because of apparent security flaws. Air Force Col. Karen Mayberry told the court Wednesday that she lost confidence in the system after large amounts of data were lost and emails from defense lawyers disappeared.