• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD, HOMELAND SECURITY UPDATE

November 13, 2015 by

11 Nov 15. AT&T joins DHS Einstein cybersecurity program.
one of the three major Internet service providers, along with Verizon and CenturyLink — signed a contract with DHS to provide intrusion prevention services through Einstein 3, allowing DHS to deploy the sophisticated firewall at agencies that use AT&T as their ISP.
Verizon and CenturyLink signed on to the program years ago, however, negotiations with AT&T stalled over questions of liability, according to a former DHS official.
“They were not interested in participating in E3A without 2511 protection,” a kind of liability protection that would have to come from the Department of Justice, said Chris Cummiskey, former DHS acting undersecretary for management, who was involved in those initial discussions.
Without AT&T’s participation in the program, large swaths of the federal government would be left out.
“It’s really essential to the whole strategy — to basically build protection using the Internet service providers as the aggregation points for government traffic, you have to have the largest providers participating in that,” Cummiskey said, noting AT&T serves 30-35 percent of federal civilian networks. “It’s a positive indicator of the pressure that’s been brought to bear to get this program jumpstarted.”
After the high-profile breaches of the Office of Personnel Management networks were revealed earlier this year, DHS officials announced plans to accelerate the program, dubbing the third phase Einstein 3 Accelerated (E3A).
The third phase of the Einstein program is designed to actively identify and block malicious traffic as it enters the network before it can infiltrate and do damage. Earlier phases enabled detection and mitigation of known threats while E3 is intended to block such attacks at the ISP level.
A DHS spokesman declined to comment on the negotiation process, including whether AT&T was granted liability protection or the scope of the final contract.
In a Nov. 11 blog post announcing the contract, Chris Smith, vice president of technology for AT&T Government Solutions, noted the partnership is an important step to protecting the .gov domain.
“Today, information is currency, power and advantage,” he wrote. “The combination of government threat information and commercial threat indicators boosts our ability to help the federal government and businesses in their ongoing fight against cyber threats.” (Source: C4ISR & Networks)

10 Nov 15. US Army Learning How Cyber Support Plays Role In Tactical Operations. The Army’s cyber branch is using pilot programs and training center rotations to show commanders at a variety of echelons what cyber capabilities can be brought to the table and, at the same time, refine how cyber will be a part of tactical operations both on the defensive and offensive side, cyber leaders said Tuesday at an Association of the US Army forum. And there’s room for improvement in how cyber support teams communicate to commanders what tools and capabilities can be used in operations, they said.
“The Army’s dependency on networks is increasing significantly, and it’s not going to decrease,” Maj. Gen. Charles Flynn, the 25th Infantry Division’s commanding general, said at an AUSA cyber forum in Arlington, Virginia.
There are a variety of things in which Army cyber is not yet up to speed. “The policies, permissions and authorities are not changing at the speeds relative to the threats; the skills are not developing at the speed relative to threats; commanders’ awareness in broad terms remains to be lacking and a big change in command for communications and cyber remain confusing across the force,” Flynn said.
The commander stressed cyber teams need to get in the warfighting formations “and they need to get out there yesterday … and you need to send your very best people because they need to be reliable and credible upon arrival, they need to describe to commanders what they offer.”
Cyber teams that are incorporated into formation

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    March 23, 2023
    Read more
  • Ajax vehicles on course for new delivery times.

    March 20, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    March 17, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT