Engage

Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Facebook
Logo
Twitter
Logo
Facebook
Logo
Twitter
Logo
Twitter
Logo
Facebook
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Facebook
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Twitter
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
Logo
Facebook
2,650,799
Like Us
Twitter
880,337
Follow Us
YouTube RSS Instagram Flickr

News Search

FILTER:
cyber
Clear

News Comments Updated
1 2 3
Dr. Tim Rudolph, center, former Air Force Life Cycle Management Center chief technology officer, signs the paperwork for a Cooperative Research and Development Agreement with Carbon Black, March 15 at Hanscom Air Force Base, Mass., while Michael Canavan, left,  Electronic Systems Development Division chief, and Damon Cabanillas, vice president of federal sales and operations, Carbon Black, look on. The Electronic Systems Development Division signed a CRADA with Carbon Black to enable deployment of advanced endpoint security technology on the Hanscom Collaboration and Innovation Center to improve cybersecurity.  (U.S. Air Force photo) Endpoint cybersecurity technology deployed through AF agreement
The Air Force Life Cycle Management Center electronic systems development division here and Carbon Black, a locally-based security company, signed a cooperative research and development agreement to improve cybersecurity for the Hanscom Air Force Base Collaboration and Innovation Center.
0 5/10
2017
Default Air Force Logo Cyber Squadron Initiative: Arming Airmen for 21st century battle
The Air Force cyber landscape of today is not the same as 10 or even five years ago; every Air Force core mission is impacted and connected by cyber. In response, the service has created the Cyber Squadron Initiative.
0 5/05
2017
Exploitation Analyst Airmen assigned to the 41st Intelligence Squadron have begun using advanced mobile desktop training that uses an environment to challenge each individual analyst in cyberspace maneuvers to achieve mission objectives at Fort. George G. Meade. (U.S. Air Force Illustration/Staff Sgt. Alexandre Montes) America’s cryptologic wing develops cyberspace warriors
As one of Air Combat Command’s integral assets, the 70th Intelligence, Surveillance and Reconnaissance Wing is home to several types of cyberspace warriors, including the exploitation analysts (EA) of the 41st Intelligence Squadron.
0 4/17
2017
(U.S. Air Force/Courtesy Graphic) Everything is listening in the digital age
Today’s environment is filled with examples of technology designed to connect Airmen to the internet: smart phones, smart watches, and other common personal technology that is always capable of connection. While Airmen grow more connected to the digital world, the connections open the door to insider and external threats eager to use those vulnerabilities to subvert data, plant malicious code or simply activate that entry point for later use.
0 3/27
2017
Default Air Force Logo Around the Air Force: March 10
On this look around the Air Force, pilots eject from an A-29A Super Tucano and Air Force Chief of Staff Gen. David L. Goldfein speaks about the importance of the space and cyber mission.
0 3/10
2017
Are your running shoes spying on you? Are your running shoes spying on you?
Five or 10 years ago, such a statement might have been appropriate for a cartoon matinee or slapstick farce, but in a new world defined by the Internet of Things, this statement isn’t just a possibility, but an actual cyber vulnerability to be aware of. Companies today are adding the word “smart” to a constellation of different products: water bottles, refrigerators, televisions, and yes, even running sneakers.
0 2/28
2017
Default Air Force Logo AF signs Automated Remediation, Asset Discovery memo
The Air Force took definitive steps Feb. 24, 2017, to secure the full range of Air Force networked systems with the mandate of the Automated Remediation and Asset Discovery (ARAD) capability.
0 2/24
2017
Royal Air Force Flight Lt. Jonny Mulhall, 6th Squadron Eurofighter Typhoon pilot, walks to his aircraft during Red Flag 17-1 at Nellis Air Force Base, Nev., Feb. 7, 2017. The Royal Air Force and Australian Air Force participated in 17-1 alongside their U.S. partners to enhance tactics, techniques and procedures in air, space and cyber domains. (U.S Air Force photo by Staff Sgt. Natasha Stannard) Red Flag 17-1 pushes domain, fifth-gen integration
As coalition pilots, intelligence analysts, and cyber and space operators convene at the Nevada Test and Training Range north of Las Vegas, for Red Flag 17-1, they have one goal in mind: work together to defeat the adversary, which at times is 20 living adversaries simultaneously working to attack allied forces on a multi-domain battlefield.
0 2/16
2017
Maintainers from the 419th and 388th Fighter Wings conduct conducts preflight checks on an F-35A Lightning II from Hill Air Force Base, Utah, during Red Flag 17-1 at Nellis Air Force Base, Nev., Jan. 24, 2017. Airmen from the active duty 388th FW and Air Force Reserve 419th FW fly and maintain the Lightning II in a total force partnership, capitalizing on the strength of both components. (U.S. Air Force photo by Staff Sgt. Natasha Stannard) ISR, cyber coordinate capabilities for maximum effect at Red Flag
Created in 1975, Red Flag was established by Gen. Robert J. Dixon, then commander of Tactical Air Command, to more realistically train forces for combat. This year’s first Red Flag, 17-1, at Nellis Air Force Base, Nevada, has today’s Intelligence, Surveillance and Reconnaissance warriors thinking about the many kinetic, or traditional weapon, and non-kinetic, information warfare, effects they can produce in battle scenarios.
0 2/07
2017
Default Air Force Logo AF looks to ensure cyber resiliency in weapons systems through new office
The Air Force, through its Life Cycle Management Center, has stood up the Cyber Resiliency Office for Weapons Systems (CROWS).
0 1/04
2017
Airmen from the 482nd Fighter Wing examine ways to prevent malware from coming onto aircraft at Homestead Air Reserve Base, Fla., Nov. 15, 2016. The 482nd Communications Squadron ext pathfinder units are looking at ways to integrate defensive cyber operations concepts into their Wings’ core mission. (U.S. Air Force photo by Desiree W. Moye ) Base level cyber squadron takes flight
In April, communications squadrons across the Air Force were tasked by their respective major commands to be pathfinder units in what has become known as the “Cyber Squadron Initiative” construct. This is meant to be a transition effort toward a new cyber unit that integrates defensive cyber operations concepts toward protecting the five core Air Force missions at the base level.
0 11/29
2016
A photo illustration of the Cyber Squadron Initiative program Oct. 28, 2016. The Cyber Squadron Initiative is a pathfinder for innovation within the Air Force cyber domain that combines Airmen from different Air Force Specialty Codes to enhance cyber surety on Air Force installations. The 325th Communication is one of 16 squadrons designated for the Cyber Squadron Initiative Air Force-wide, and the first selected for Air Combat Command. (U.S. Air Force photo illustration by Senior Airman Solomon Cook/Released) Innovative cyber program protects critical Tyndall AFB assets
The 325th Communications Squadron became the first Air Combat Command squadron to join a new initiative to ensure Tyndall Air Force Base is able to train and project unrivaled combat airpower. The Cyber Squadron Innovation is a pathfinder program among Air Force communication squadrons, enabling communications squadrons to provide secure communication assets and services with a focus on security assurance.
0 11/08
2016
Default Air Force Logo Around the Air Force: Nov. 1
On this look around the Air Force a reduction in ancillary training is announced, cyberattacks are the leading strategic threat and a preview of the latest episode of BLUE features Air Force tankers.
0 11/01
2016
Default Air Force Logo Taking the fight to the cyberspace frontier
In a highly secure, underground facility in Colorado Springs, crews of operators in a room full of computers keep an ever vigilant eye, protecting worldwide U.S. assets around the clock. This facility is not underneath tons of granite in the midst of Cheyenne Mountain, like a more well-known part of the 21st Space Wing. It is located below street level in a building on Peterson Air Force Base, protecting a different part of space – cyberspace.
0 10/26
2016
Gen. Joseph Lengyel, chief of National Guard Bureau, addresses an audience at the North American International Cyber Summit 2016 in Detroit, Oct. 17, 2016. Hosted by Michigan Gov. Rick Snyder, the summit was a collaborative effort with the National Governors Association, the Department of Homeland Security, private industry, educators, students and local partners. (U. S. National Guard photo/Sgt. 1st Class Jim Greenhill) National Guard uniquely positioned to contribute in cyber realm
The civilian-acquired skills of its members enable the National Guard to make unique contributions in the cyber realm, Gen. Joseph Lengyel, chief of the National Guard Bureau, said Oct. 17. Lengyel told audience members at the North American International Cyber Summit 2016 that Guard members can be found in high-tech companies ranging from startups to Google and Microsoft.
0 10/19
2016
Gen. Ellen M. Pawlikowski, the Air Force Materiel Command commander, speaks to an audience during the Air Force Association's Air, Space and Cyber Conference in National Harbor, Md., Sept. 21, 2016. She spoke about the importance of cyber security. (U.S. Air Force photo/Staff Sgt. Whitney Stanfield)

AFMC commander says cyber threats are real, need to get ahead of them
Cyber resiliency and hardening are more important now than ever and the Air Force Materiel Command commander made that point as she addressed a crowd at the Air Force Association Air, Space and Cyber conference in National Harbor, Maryland, Sept. 21.
0 9/21
2016
Lt. Gen. Kevin McLaughlin, the U.S. Cyber Command deputy commander, discusses cyber warfare during the Air Force Association's Air, Space and Cyber Conference in National Harbor, Md., Sept. 20, 2016. (U.S. Air Force photo/Scott M. Ash) Cyberwarfare: What are we doing today?
Lt. Gen. J. Kevin McLaughlin, the U.S. Cyber Command deputy commander, discussed the missions, capacity and capabilities of USCYBERCOM during a cyber warfare session at the Air Force Association Air, Space and Cyber Conference here Sept. 20.
0 9/20
2016
Default Air Force Logo AF Space Command leader releases strategic intent doc
The head of the Air Force Space Command revealed his updated Commander’s Strategic Intent May 6. The strategic intent document serves as the overarching document guiding the command.
0 5/09
2016
Default Air Force Logo Around the Air Force: May 6
This look Around the Air Force takes us to Hurlburt Field, Florida, where special operations Airmen are participating in exercise Emerald Warrior 2016 and then a look at Maxwell AFB, Alabama, where the Air Force Cyber College conducted a cyber war game.
0 5/06
2016
Cyber experts from across the military, government agencies and private industry joined forces at Maxwell Air Force Base, Ala., April 27, 2016, to mitigate future cyberattacks within the U.S. The Air Force Cyber College's two-day wargame brought the CIA, FBI, Goldman Sachs and others into participation. Security experts analyzed how they handled cyberthreats independently, and how they could team to improve combat cyber incidents of national significance. (U.S. Air Force graphic/William Blankenship) Air University wargamers battle to keep America's lights on
Cyber experts from across the military, government agencies and private industry joined forces at Maxwell Air Force Base, Alabama, April 27, to mitigate future cyberattacks within the U.S. The Air Force Cyber College's two-day wargame brought the CIA, FBI, Goldman Sachs and others into participation. Security experts analyzed how they handled cyberthreats independently, and how they could team to improve combat cyber incidents of national significance.
0 5/04
2016
1 2 3
RSS