Monitoring American Cyberspace Policy

The rest of the world is carefully watching the United States as it develops its cyber policies, said Robert Childs, chancellor of National Defense University’s iCollege. Speaking at AFA’s CyberFutures Conference outside of Washington, D.C., on Friday, Childs said iCollege...

Debating an International Cyber Code of Conduct

Cyber officials with National Defense University’s iCollege debated the merits of developing an international code of conduct for cyberspace at AFA’s CyberFutures Conference in National Harbor, Md., on Friday. Such a code would be similar to what’s being discussed with...

Leading Against the Enemy Within

Given the right training and technology, the Air Force is better equipped than the private sector to thwart hackers after they have breached a network’s outer defenses, said Richard Bejtlich, chief security officer for Mandiant, an information security company headquartered...

Know Your Enemy

Cyber security specialists are asking the wrong question when it comes to securing computer networks against external threats, said Richard Bejtlich, chief security officer for private security contractor Mandiant of Alexandria, Va. Testing for network vulnerably gives Air Force cyber...

Cyber History Ignored

The Air Force needs to teach airmen about the service’s cyber history just like they are inculcated with the service’s airpower history, stressed Jason Healey, cyber strategist with the Atlantic Council. Defense Department doctrine identified the key aspects of cyber...

Beyond Government Defending Itself

The private sector has confronted and solved the majority of major cyber attacks, but government and defense still view themselves as the lead defensive entity, said Jason Healey, cyber statecraft director with the Atlantic Council. The Department of Homeland Security’s...

Filling the Cyber Pipeline

Gen. William Shelton, head of Air Force Space Command, said Thursday the lack of cyber recruits is a “serious national security issue.” Speaking at AFA’s CyberFutures Conference outside of Washington, D.C., Shelton said only about four percent of degrees granted...

Network Probes Getting More Sophisticated

The Defense Department’s networks are probed by unauthorized users roughly 10 million times a day, said Gen. William Shelton, head of Air Force Space Command. Speaking Thursday at AFA’s CyberFutures Conference in National Harbor, Md., Shelton said some of those...

Root Cause Analysis

The defense and intelligence community is getting better at tracing and attributing long-term repetitious cyber attacks, but is less capable of pinpointing spontaneous attacks in a timely manner, said James Jaeger, director of defense and commercial cyber systems for General...

Cyber Age Acquisitions

The Air Force needs a quicker, more flexible acquisition system combined with personnel capable of writing requirements tailored to the cyber domain, said Michael Papay, Northrop Grumman’s cyber initiatives vice president. “Our typical contract types aren’t exactly a very good...

Getting Geeks in Blue

With its structure, discipline, and hierarchy, the Air Force has an uphill battle to recruit the eccentric personnel needed to seize the initiative in the cyber realm, said Lynn Dugle, Raytheon’s president of intelligence and information systems, Thursday. While many...

No Son of X-37

The Air Force is not planning a larger follow-on to the shadowy X-37B reusable junior space shuttle or an increase in the number of X-37s beyond the two that it has, said Gen. William Shelton, Air Force Space Command boss,...

Not As Bad as it Looks

No one should be alarmed that Air Force Space Command’s budget is dropping 22 percent from Fiscal 2012 to Fiscal 2013, Gen. William Shelton, AFSPC commander, told reporters Thursday. That reduction really doesn’t reflect “what we’re doing in the space...

Centers of Attention

Northrop Grumman announced that it has won the contract to modernize the Air Force’s air and space operations centers, the command and control hubs from which airmen execute air campaigns and coordinate cyber and space activities. The initial contract is...