Humans continue to be the weakest link in cybersecurity, but they also could become its strongest asset.
Giddy up! Military and civilian bomb squad operators are taking to a capabilities exercise robot rodeo to showcase proficiencies and uses of robotics in the field. For the first time in nearly a decade, organizers included unmanned aerial vehicles in the competition.
It all began with Dolly, the first animal to be cloned from an adult somatic cell. While technical advances continued to make the news, their effects and the possibilities they created did not reach lawmakers or the legal profession.
A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.
The Internet of Things (IoT) and big data may combine to generate the greatest cyberthreat of all.
Contract protests can be the fault of government, contractors or the process itself. For government, it may be something as simple as lack of understanding on the part of contracting authorities.
If the confession of evil works is the beginning of good works, as Saint Augustine is quoted as saying, today might prove quite cathartic. It’s World Password Day!
Does artificial intelligence (AI) pose a threat to the human race, as many notable technologists recently have suggested? And what should be its role in the intelligence community?
Personal identifiable information (PII) constantly is under threat of being compromised. One solution may be to create vaults that grant access to authorized organizations. But will it work, or even be embraced by the public?
NATO has initiated Dynamic Mongoose, this year's biggest antisubmarine warfare exercises in the North Sea, with a focus on detecting and defending against submarines.
Twenty companies will participate in a trade mission with Romania and Poland.
Proposed cybersecurity legislation is a good start, but much remains to be done to secure the nation from cyberthreats—starting with trust and cooperation among diverse organizations.
It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.
Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment.
The U.S. Defense Department now has a leader who fully grasps how technology can strengthen the defense base. Yet, bringing the military and the high-technology private sector together is not as easy as it used to be, given cultural differences.
Don't expect important cyber legislation to be sent to the president any time soon. If history is any judge, all that will emerge is a rehash of existing regulations or executive actions codified for public consumption.
Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.
Cybersecurity has become a mission of equal importance to the Department of Homeland Security as combating terrorism, Secretary Jeh Johnson shares at the RSA Conference 2015 in California.
Guest blogger Justin Marston tackles the reality that is the current state of classified mobility across the U.S. government—voice and basic email. It’s not what senior leaders want, he writes. They want apps, just like everyone else, but their (justified) level of paranoia has neutered most mobile devices.
Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and web browser.