Cyber News

  • What Will You Pay? Check TRICARE Cost Resource

    Have questions about health care, pharmacy, or dental costs? You should check out the TRICARE Costs and Fees 2022 Fact Sheet. This resource provides an overview of most of your costs and fees for TRICARE health plans, the TRICARE Pharmacy Program, and the TRICARE Dental Program.

  • How to get urgent care under your TRICARE health plan

    Do you have an injury or illness that isn’t quite serious enough for a trip to the emergency room? This might be the right time to go to an urgent care center. Most TRICARE beneficiaries can go to an urgent care center whenever they need to. You just want to be sure to check out and follow the

  • Dragons Must Eat: China’s Food Insecurity and Strategic Vulnerability

    Although definitions of vary, most formulations of the term focus on the ability to reliably satisfy a population basic nutrition requirements despite friction and adverse circumstances with domestic production or imports. Historically, food security has been a critical Chinese strategic goal, and

  • Did You Know that January is Human Trafficking Awareness/Prevention Month?

    Human trafficking, also known as trafficking in persons (TIP) is a form of modern day slavery.  It is defined as the recruitment, transportation, transfer, harboring, or receipt of persons by means of threat, use of force, coercion, abduction, fraud, deception, abuse or exploitation.   The Air Force

  • Online Safety Tips: Spot the Scam

    Cyber criminals are getting more creative every day, but DCMA IT pro Tobi Beck shares some top tips for protecting yourself online.

  • Civilian Development nomination window opens; expanded eligibility

    The Air Force’s Personnel Center is accepting nomination packages from Department of the Air Force (DAF) civilians for more than 35 Civilian Development opportunities starting Jan. 18.Civilian Airmen and Guardians can apply for up to four programs by submitting their application, resume, and

  • Afghanization and the Prompt Collapse of the Nation

    This article examines the causes that led to such an fall of Afghanistan. Failure is characterized by two factors. The first is the failure of the mission on the military front. US government was being present and active in Afghanistan shortly after the 9/11 attacks, when Taliban refused to hand in

  • Preparing for the next winter storm

    Through the lessons learned last year, it is now easy to see that storms can be unpredictable and its intensity can be difficult to measure until it is upon us. Members must take the time to prepare by creating a plan and educating themselves and others on winter hazards.

  • Iranian intel cyber suite of malware uses open source tools

    To better enable defense against malicious cyber actors, U.S. Cyber Command’s Cyber National Mission Force has identified and disclosed multiple open-source tools that Iranian intelligence actors are using in networks around the world.

  • Spirk Discusses DOD's 'Data-centric' Future

    The Defense Department is focusing data on joint warfighting activities and actions put in place in the past are bearing fruit, David Spirk, the department's chief data officer, said.

  • DOD Cyberspace: Establishing a Shared Understanding and How to Protect It

    The full consequences of potential adversary cyberspace operations (CO) in the DOD are still being fully understood. Yet, there is a lack of shared understanding about cyberspace across the DOD and the joint force and even less understanding of how the DOD should protect its cyberspace. Despite a

  • Competing Regionally: Developing Theater Strategy

    The past two decades have been tough for strategists. Large-scale efforts in Central Asia and the Middle East did not bring the successes policymakers demanded, despite considerable blood and treasure expended, and though free of U.S. combat casualties, the record in both Europe and the Indo-Pacific

  • 2021: A Year in Review

    Here are some of U.S. Cyber Command’s (CYBERCOM) impactful moments of 2021: In the last year, the cyber security community has encountered new challenges and worked to adapt and respond in innovative ways. Ransomware is no longer considered just criminal activity, but a threat to National defense