Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs.
In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.
Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.
The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.
The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...
The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.
Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.
Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?
At a time when the U.S. critical infrastructure is at its most vulnerable point, the Department of Homeland Security is moving away from cooperation and coordination with the private sector.
The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.
The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.
The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.
NIST published today its final guidelines for federal agencies to use when they provide unclassified but sensitive information to nonfederal workers, such as contractors or universities that work with the government.
On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.
AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.
Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.
Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.
Too many experts who are weighing in on the debate of when to consider a cyber attack an act of war are not experts at all. A nation's leadership must respond carefully using existing international guidelines.
The U.S. defense industrial base seems to be going out with a whimper. Only four companies now crack the list of the top 100 U.S. firms based on revenue, and this unwelcome development has occurred against a backdrop of global instability and change.
The Information Age is on the brink of a new revolution as quantum mechanics begins to influence its developments. But, uncertainty reigns when it comes to predicting what will emerge and how it will affect the world.