Have you ever walked into a business meeting and wished you could know a bit about each person attending to spark real conversation and bypass the typical small talk? The free Refresh app for iOS provides a quick overview of the people you're about to meet, aggregating information from across the Web.
The inertial navigation system (INS) market size is estimated to be $2.75 billion in 2014 and is projected to grow at a compound annual growth rate of 10.98 percent to reach $4.63 billion by 2019, according to Research and Markets, a Dublin-based market analysis firm.
Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.
Imagine getting alerts from drivers around you in real time. Police officer around the next curve? A broken down vehicle blocking the shoulder? The free community-based app Waze makes it possible by crowdsourcing traffic and road information to provide drivers with the best route.
The growing call for an independent U.S. cyber service along the lines of the Army, Navy, Air Force and Marine Corps is not likely to gain followers among policy makers, say a number of service cyber officers.
The acting chief information officer (CIO) for the U.S. Defense Department is promoting a diversity movement for information technology. He wants to see a younger work force that includes people who have come of age in the digital era.
U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.
U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.
Estonia has established a dedicated cyberdefense infrastructure and implemented new policies that are serving as models for other allied nations gearing up for potential cyber attacks. The Estonian measures come in the wake of the Baltic nation undergoing a severe cyber attack in 2007.
Encountering many variables as it strives to achieve effective cybersecurity, NATO is focusing on two long-standing constants to move forward: training and partnerships with industry. The Atlantic alliance is seeking industry help in pursuing solutions, and it is adopting many traditional methods and institutions to train personnel in vital cyberskills.
Defenders of cyberspace need to concentrate on the critical services provided by the critical infrastructure, not the infrastructure itself, according to a leading cyber expert. Melissa Hathaway, president of Hathaway Global Strategies and former acting senior director for cyberspace with the National Security Council, said that the future of the West is held hostage to the fact that its security and resilience are threatened.
Even with the rising tide of nation-sponsored cyber attacks, NATO does not yet have a policy—let alone a definition—of what constitutes a cyber attack that would mandate a response under Article 5 of the alliance’s Washington Treaty, according to NATO officials. Article 5 defines an attack on a NATO member as “an attack on all,” requiring a response by all members against an aggressor.
With cyber losses running in the hundreds of billions of dollars, the private sector must establish its own standards for cybersecurity or face government regulations that would be painful for some firms. Either way, regulatory guidance is necessary for the private sector to avoid potentially fatal hemorrhaging of assets and information to cybermarauders.
A new management trend may impel corporations to implement better cybersecurity: lead or get out of the way. Either corporate leaders take the initiative for improving their companies' cybersecurity, or shareholders will demand their ouster following a damaging attack that puts corporate futures in doubt.
Businesses that neglect their cybersecurity needs risk being put out of business by even the simplest of attacks, according to cybersecurity experts. While all companies face the threat of a devastating financial cyber robbery, even a simple attack that steals information could be the end for a small- or medium-size business.
Many U.S. companies are losing business because of cyber issues expressed by foreign firms. These concerns can range from fears of U.S. vulnerabilities to worries that intelligence agencies will have access to information held by U.S. contractors.
"Cyber is the ultimate team sport." The U.S. Cyber Command (CYBERCOM) faces a unique set of challenges as it tries to engage industry and academia in the cybersecurity effort, according to its commander.