News Search

cyber security

News Comments Updated
Members of the 26th Network Operations Squadron perform maintenance on an Air Force gateway server Nov. 2, 2017, at Maxwell Air Force Base-Gunter Annex, Alabama. While the migration to the Joint Regional Security Stacks will transition ownership of security architecture from the Air Force to Defense Information Systems Agency, the 26th NOS will retain operational control of traffic flow for Air Force networks. (U.S. Courtesy photo) USAFE networks migrate to Joint Regional Security Stacks
Another milestone was reached on the path to the Joint Information Environment Oct. 10, 2017, as all bases within the U.S. Air Forces in Europe Command began their migration from the Air Force gateways to Joint Regional Security Stacks.
0 11/06
Default Air Force Logo Yesterday’s Air Force: Computers
FORT GEORGE G. MEADE, Md. (AFNS) – This episode of Yesterday's Air Force looks at the history of the Air Force’s use of computers and how they have influenced the Air Force. Computers were originally developed to be problem solvers, but their vulnerabilities soon created a new era of problems, leading to the inception of cyber security and the cyber career field.
0 9/11
A member of a Cyber Protection Team participates in the Air Force's Exercise Black Demon, designed to validate his ability to protect and defend specific critical missions or assests. Unlike other communications specialists who work to defend and protect an entire network, CPTs have advanced training and skillsets that go deeper into locating and then neutralizing the threats posed to high priority missions. (U.S. Air Force photo by Airman 1st Class Daniel Garcia) The story our network tells
By taking the pulse of the Air Force network, Acquisition personnel here hope to improve security, reduce maintenance costs and mine data produced by millions of daily operations.
0 8/18