US Invests Big In Space Force Cyber Security

As cyber warfare becomes the weapon of choice for adversaries, and the global economy becomes ever more dependent on space systems, space is a critical domain for cybersecurity.

Now the US Pentagon is planning to significantly increase the size of the United States Space Force’s cyber security team and the number cyber personnel will increase by over a thousand starting next year.

“Space systems will become the next front of the cyber conflict,” the US Space Force Major General Kimberly Crider said in a statement. The Pentagon is to significantly increase the size of the United States Space Force's cybersecurity team.  They plan to add over a thousand new personnel and Crider said that 130 cybersecurity officers would be transferred into the Space Force along with 1,000 enlisted personnel, who would be assigned cybersecurity work in 2021.

The staff who are to be transferred have been supporting the Space Force from their positions within the US Air Force. Once the transfer has been complete, the staff's main focus will be on the Space Force's defensive operations. Part of the Space Force's cyber future response would include technologies like GPS anti-jamming solutions and Protected Anti-Jam Tactical Satcom (PATS).

The force is also introducing military procurement events and programs that will allow its personnel to acquire state-of-the-art capabilities from non-traditional vendors.

One event Space Force Pitch Day, which is to take place in Los Angeles in the spring of 2021, hosted by the Space Force’s Space and Missile Systems Center (SMC). 

The future of cyber warfare will be determined by US government strategic policies and the new technologies and US Space Command believes in the value of understanding the different types of cyber attack technologies and methods. General Crider praised the commercial defense industry for its work building security into military systems and networks and said that diversity will be a key element in building resilience. If one space system is jammed, the plan is to have other systems that they can fall back on. 

Service Team IT:       Satellite Today:         Infosecurity Magazine:       AeroTech News:      The Cove

You Might Also Read:

Communications Satellites Are Vulnerable:

 

« 2020 - Business Cyber Readiness
‘Robin Hood' Hackers Donate Stolen Money »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.