Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:05 PM
Dark Reading
Dark Reading
Products and Releases

Gillibrand Secures Approval For Defense Department Study On Recruiting And Retaining Cyber Warriors

Cyberspace Warriors Act of 2011 would direct the Secretary of Defense to contract an independent organization to study the Department’s cybersecurity personnel requirements

Washington, DC – U.S. Senator Kirsten Gillibrand, a member of the Senate Armed Services Committee, today announced the inclusion of her Cyberspace Warriors Act in the FY 2012 National Defense Authorization Act. While the establishment of U.S. Cyber Command and cyber components in each of the four services has been crucial to the development of military cyber security, military leaders recognize that attracting, retaining and maintaining cyber warriors remains a challenge. Senator Gillibrand’s legislation would require the Secretary of Defense to conduct independent research of the Department’s requirements for cyber-security personnel recruitment, training and retention.

“Cyber warfare is an emerging threat that could affect every aspect of our national and economic security,” Senator Gillibrand said. “Terrorists could shut down electric grids in the middle of winter, zero-out bank accounts, or take down a stock exchange, causing an unimaginable amount of disruption and harm. Meanwhile, many of the best and brightest in information technology work in the private sector. We need to ensure that the U.S. military has the resources to recruit and retain these talented individuals to protect our national security.”

In today’s economic environment, many of the top computer network operations and information technology (CNO/IT) specialists are choosing to work in the private sector, attracted by financial incentives, entrepreneurship trainings and flexibility. It is therefore important that the Department of Defense develop new and innovative ways and receive the tools needed to recruit and retain cyber warriors. To date, the Air Force is leading the military in cyber warfare training having recently graduated its first class of “Cyberspace Operations Officers.”

The Cyberspace Warriors Act of 2011 would direct the Secretary of Defense to contract an independent organization to study the Department’s cyber security personnel requirements. The study would include a review of the number of personnel required for cyber operations; obstacles to recruitment and retention; potential avenues to address challenges in recruitment, training, and retention, including the reserves, individual ready reserves, civilian expeditionary workforce, corporate and university partnerships, ROTC and civilian auxiliaries.

Now that the Senate Armed Services Committee has approved the provision as part of the FY 2012 National Defense Authorization Act, the bill will now be sent to the full Senate for passage, reconciled with the House version, and pass the full Congress before being sent to the President for signature.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...
PUBLISHED: 2020-11-24
HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.
PUBLISHED: 2020-11-24
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters to test-browser/index.cfm allow directory traversal.
PUBLISHED: 2020-11-24
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters passed to system/runners/HTMLRunner.cfm allow an attacker to write an arbitrary CFM file (within the application's context) containing attacker-defined CFML tags, leading to Remote Code Execution.
PUBLISHED: 2020-11-24
Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.