As the Defense Department contends with greater and more sophisticated cyber attacks, it needs to enhance security from "chip to the cloud" and boost the speed and performance of system defenses, while remaining cost-effective, according to a recent Lexington Institute blog post.
The agency said the guide isn't official DoD or DISA policy, a security requirement or technical implementation guidance, but "a collection of best practices discovered during the DoD [Chief Information Officer] Cloud Pilots effort."
Tobias Feakin, senior analyst with the Australian Strategic Policy Institute, provides a general framework that outlines what governments should do to develop a proportionate response.
A DDoS attack occurs when multiple compromised computers or systems, potentially hundreds of thousands, are directed to a single system with the intent of disrupting or denying legitimate users access to information, communications and communications capabilities.
The Defense Department issued a directive last week that creates a council to handle oversight for new guidelines that will standardize and unify its cyber workforce and policies.
Federal aviation regulators by September expect to develop a foundation for a detailed plan to integrate drones into U.S. airspace, and then enact it in December, congressional investigators said in a new report.
The Air Force is seeking commercial information technology to help it better monitor its networks for insider threats. The product will be a key component to the development of its Insider Threat Program, according to a solicitation posted by the service Aug. 11.
The Pentagon took down the Joint Chiefs of Staff unclassified email network after it noticed suspicious activity that later revealed a cyber attack by Russian hackers, NBC News reported Aug. 6, citing unnamed sources.
The Joint Chiefs of Staff unclassified email network has been down for more than a week – at least since July 29 – for an investigation into suspicious activity.
The Georgia Institute of Technology announced June 30 that it was awarded a $4.25 million contract from the federal government to find out exactly where data move as it's routed from one host to another and if, for example, malicious code is attached to that data.