Protecting Yourself in the Digital Age

By Capt. Bryan Lopez, Retired Space and Naval Warfare System Command Network security in the workplace is of paramount importance to our daily mission, but we can’t forget to protect ourselves against cyber vulnerability in our personal lives as well. Here are a few tips to help: Operating System Updates and Anti-Virus Software One of …

All Hands Need to Practice Cyber Safety

By George D. Bieber Naval Information Forces Public Affairs Cyberthreats come from a variety of sources including nation states, profit-motivated criminals, ideologically motivated hackers, extremists and terrorists. When you log on to a Navy network or system, you’re in the cyber battlespace. If there are weaknesses in the Navy’s defenses, its networks and computers can …

The Navy’s Cybersecurity Focus

From Office of the Deputy Chief of Naval Operations for Information Warfare (N2N6) Testifying before the Senate Armed Services Committee this year, Vice Adm. Michael Gilday, commander of U.S. Fleet Cyber Command / U.S. 10th Fleet, stated, “U. S. Navy freedom of action in cyberspace is necessary for all missions that our nation expects us …

Do you have what it takes to ‘Hack the Air Force’?

The Air Force is inviting vetted computer security specialists from across the U.S. and select partner nations to do their best to hack some of its key public websites.

The initiative is part of the Cyber Secure campaign sponsored by the Air Force’s Chief Information Office as a measure to further operationalize the domain and leverage talent from both within and outside the Defense Department.

Everything is listening in the digital age

Today’s environment is filled with examples of technology designed to connect Airmen to the internet: smart phones, smart watches, and other common personal technology that is always capable of connection. While Airmen grow more connected to the digital world, the connections open the door to insider and external threats eager to use those vulnerabilities to subvert data, plant malicious code or simply activate that entry point for later use.