US Cyber Mission Force Nearly Ready for Action

The US military’s Cyber Mission Force will finally be ready for action by the end of September, according to US Cyber Command and NSA boss, Admiral Michael Rogers.

The new elite cyber force will eventually contain over 6000 operatives split into 133 groups, which will be tasked with both offensive and defensive missions.

Unusually for a military endeavor, troops will be deployed before the unit has been completely staffed,

"We find ourselves in a situation a little unusual in the military arena. As soon as we get a basic framework, we are deploying the teams and putting them against challenges,” Rogers is reported as saying.

“I just always feel like we're in a race to make sure we are generating capacity and capability, and that we are doing it faster than those who would attempt to do harm to us.”

The force, which apparently features military personnel alongside civilians, is estimated to finally be ready on 30 September 2018.

Recently Air Force Brig. Gen. Charles L. Moore Jr. told the House Armed Services Committee that the Cyber Mission Force has already encountered a few challenges relating to equipment, training, recruitment and “finalizing the command-and-control structure.”

It also emerged that US military cyber troops have been given their first opportunity to engage in digital combat “at scale” in the ongoing war with ISIL.

A much more formidable enemy, however, is China, which the Pentagon suspects is rapidly building up its own cyber warfare capabilities.

An annual report to Congress in May claimed the PLA would “likely use Electronic Warfare, cyberspace operations (CO), and deception to augment counter-space and other kinetic operations during a wartime scenario to deny an adversary’s attainment and use of information.”

Infosecurity

 

« Cloud Video Architecture Improves Emergency Services Response
Snowden iPhone Case Alerts Users To Surveillance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.