Author Archive

Kevin Coleman

Senior Fellow

Kevin Coleman is a senior fellow with the Technolytics Institute, former chief strategist at Netscape, and an adviser on cyber warfare and security. He is also the author of "Cyber Commander's Handbook." He can be reached by e-mail at: kgcoleman@technolytics.com.
Defense Systems

Modern tradecraft moves in parallel with cyber operations

A free wireless network at Starbucks might be the medium for passing along intelligence.

Defense Systems

Needed: A succession plan for the next generation of cyber defenders

What's required is a mentoring program that retains lessons learned while developing new cyber defense expertise.

Defense Systems

The New CIA: Cyber Intelligence Agency

The growing need for cyber intelligence will only increase as new technologies are deployed.

Defense Systems

Securing our satellites before they are launched

Cybersecurity must be baked into military satellites during the design phase.

Defense Systems

False sense of cybersecurity

Testing your own defenses is important -- and too many organizations are doing it incorrectly.

Defense Systems

The need for skilled cyber project managers

The need for classified program and project managers is growing, but there is a startling lack of professional development for those positions, writes Kevin Coleman.

Defense Systems

The digital–physical intersection

Can the U.S. defend a physical world that is becoming increasingly digital?

Defense Systems

Re-thinking cyber training for officers

A proposed curriculum for training next-gen leaders of our cyber forces.

Defense Systems

Are NSA's capabilities outclassed by GCHQ?

Edward Snowden's leaked documents also cast an eye on data collection by British intelligence. What will surface next?

Defense Systems

The international backlash of PRISM

Is it only a matter of time before PRISM is used as an excuse for cyber aggression?

Defense Systems

Between a rock and a hard place

Trust is earned, not freely given. Gaining, or as some would say regaining, that trust must be a priority for the administration and the intelligence community. And, as we’ve seen over the last week, that job just got a lot tougher.

Defense Systems

The hidden impact of a cyber breach

The implications of a breach go far beyond what we commonly see in the headlines. The true cost must be taken into consideration when assessing the proper level of security for these systems.

Defense Systems

How to properly assess cyber security

While a perfect cyber security assessment does not exist, using the internationally recognized ISO set of standards provides a solid foundation upon which organization’s can build.

Defense Systems

The imperative of cyber force leadership

Here is an idea, why don’t we launch a re-skilling program for all the veterans returning from Iraq and Afghanistan and give them the cyber skills necessary for these roles.

Defense Systems

Operating Solo in Cyber

It is dangerous to operate without universal acceptance of the application of international law to the cyber domain by the majority if not all of the 231 countries/territories connected to the Internet.

Defense Systems

Power projection in cyber space

How many technical glitches in the digital world are actually the result of cyber attacks we didn't know about?

Defense Systems

Putting the cyber threat domain into context

Things are rapidly changing in the cyber threat domain.

Defense Systems

What might special operations in cyber look like?

The concept of special cyber ops is rapidly evolving, as are most of the concepts, strategies and weapons used in the cyber domain.

Defense Systems

Differing Opinions on Cyber Threat

It is important to understand why there are differing opinions as to the current cyber threat level

Defense Systems

Cybersecurity requires robust intelligence

It is no secret that to defend our critical infrastructure from the threats emanating from cyberspace requires cyber intelligence.