Archive Articles (2024)
By Ian Leatherman
May 14, 2024
Lessons learned from Navy Nuclear experience can inform the professionalization of our cyber force.
(Image: Naval History and Heritage Command)By Dr. Matt Morris
May 14, 2024
MCPA establishes a new tradition - Gray Call, embracing gray as a uniform cyber color for this Joint MCPA event.
(Image: MCPA)By James Crabb and Assefaw Gebremedhin
May 14, 2024
Washington State University details their experiences leading a VICEROY Education and Research program.
(Image: Washington State)By Chester "CJ" Maciag, Patrick Johnson, Star Hardison, and Matt Isnor
May 6, 2024
Needing a unified direction for effective management of the Department of Defense’s military and civilian cyber workforce led to the development of the 2023-2027 Cyber Workforce (CWF) Strategy and companion Implementation Plan. This approach serves as a roadmap for how the cyber workforce will grow and adapt as a safeguard for our Nation’s security. Furthermore, this article highlights the many opportunities to become part of the talent pipeline contributing to fulfill the missions within an ever-changing cyber domain.
(Image: DoD CIO)By 1LT Conrad W. Franke
May 6, 2024
Badge Life comes to HammerCon 2024 - here's the journey from concept to reality
(Image: Conrad Franke)By Ronnie Bustamante
April 23, 2024
MCPA hosted its 2023 Board of Advisors meeting, celebrating milestones of scholarships, publications, and a new National President
(Image: MCPA)By Dr. Michael Senft
March 21, 2024
The relative advantage between attackers and defenders in cyberspace has been the subject of vigorous debate. I argue that the debate should be resolved in favor of cyber attackers, who possess freedom of maneuver to invalidate security assumptions required by modern digital systems. Using the recent “LogoFail” exploit and the 2020 SolarWinds hack, the attacker’s ability to invalidate security assumptions is explored. The limitations of current U.S. cyber strategy are then examined through the lens of attacker advantage in cyberspace. While restraint in the conduct of offensive cyberspace operations is noble, attacker advantage in cyberspace presents challenges in preparing for future conflict.
(Image: DALL-E)By Paul F. Renda
January 19, 2024
Personal computer BIOS/UEFI settings are essential to security of the system from advanced adversary attack vectors.
(Image: Paul F. Renda)