Letter: Information security effort same as previous efforts

Regarding "Experts tackle guidance to stop cyberattacks"

This effort, which is no different from previous efforts in the area of information assurance, is primarily looking at securing the network in order to secure the data objects within the network. Failure always occurs when the network security is penetrated and all the data objects are then vulnerable since security is not on the data objects but on the network.

The United States Special Operations Command at MacDill Air Force Base in Tampa, Fla., has a development effort that concentrates security on the data object while manitaining security on the network. The project is called Classification Stateless Technology Environment (CSTE). And although it it not fully mature, portions where demonstrated in CWID 08 (June 08) and additional capabilities will be demonstrated in CWID 09 (June 09). I'd recommend contacting Lt. Col. Scott Rutherford in the Science
Advisors Office at U.S. SOCOM for further information.

Francis J. Adamouski Jr.
InfoAssure, Inc.

What do you think? Paste a comment in the box below (registration required), or send your comment to [email protected] (subject line: Blog comment) and we'll post it.

Featured

  • Management
    shutterstock image By enzozo; photo ID: 319763930

    Where does the TMF Board go from here?

    With a $1 billion cash infusion, relaxed repayment guidelines and a surge in proposals from federal agencies, questions have been raised about whether the board overseeing the Technology Modernization Fund has been scaled to cope with its newfound popularity.

  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

Stay Connected