Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.
You might hit the gym or stay active for your health, but do you exercise your brain? The scientifically designed program Lumosity provides personalized training to help you improve memory, attention and a wide variety of other cognitive skills.
Understanding how to communicate your story effectively is just one important skill for women, and really anyone regardless of gender, hoping to take risks and achieve results in the workplace, explained Shelley Smith, founder and president of Premier Rapport, during the inaugural Women in AFCEA fall event. Ask yourself, “Is the risk greater if I do or is the risk greater if I don’t?”
You would think it would go without saying, but apparently not. So a U.S. Transportation Security Administration representative wrote a brief blog on a few Halloween travel tips if travelers are taking flight with costumes in tow.
Engineers are packing more powerful sensors into smaller and smaller forms for use on lighter aircraft and unmanned aerial vehicles, giving the U.S. military unprecedented high-end multi-spectral capability from greater distances.
The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.
Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.
With the Ebola outbreak dominating headlines and flu season looming, it's difficult to know where to turn for fast, reliable health information. That's where the Centers for Disease Control and Prevention comes in, offering a variety of apps to help you protect yourself.
Network modernization is becoming a priority for defense agencies—and for good reason. Much of our defense network infrastructure was conceived 20 years ago and put into place almost a decade ago. While the networks remain the same, the technologies that depend on them have advanced, and innovation can no longer be supported by outdated and ineffective infrastructure.
Two researchers have won the first public challenge contest sponsored by IARPA to predict people's trustworthiness.
When it comes to STEM, it is time to stop talking about the need and the gap and the possible solutions and start doing something about them. Action not only requires that more students and future teachers major in STEM fields but also that governments and the private sector put their money where their mouths are by providing financial support to these students.
The Defense Advanced Research Projects Agency (DARPA) put a call out for technology that can detect and identify from great distances dangerous biological and chemical substances.
Military experts and defense contractors are testing technologies in Georgia to thwart the preponderance of roadside bombs that hamper U.S. military and coalition forces' combat and resupply missions. Participating defense contractors are competing for an existing $49.5 million contract.
Calling all mathematicians: DARPA, the Defense Department’s main research arm, seeks help in developing a program that essentially would lead to "unhackable" computer software programs.
House Homeland Security Committee chair proposes technology mix for securing the southern border.
How many days equal a billion hours? Researchers from the U.S. Army Research Lab are about to find out. This week, they began modeling the engine spray mixture formation process using access to one billion hours of supercomputing time on some of the world's fastest computers.
(ISC)² is offering a series of tips to educate the public for National Cyber Security Awareness Month.
Multiple autonomous underwater vehicles equipped with modern sensors relevant to NATO minehunting missions are being employed at sea during the Multinational AutoNomy Experiment (MANEX ‘14), held September 22 to October 13, 2014, along the Italian coast, between Framura and Bonassola, in the Ligurian Sea.
Massive tents housed booths with roughly 400 companies pitching the up-and-coming technology to approximately 8,000 attendees at the 2014 Modern Day Marine event held at U.S. Marine Corps Base Quantico in Virginia. Much of the technology focused on equipping expeditionary forces.
The Defense Department is planning a pilot study to determine the feasibility of a bring-your-own-device program within the department, says Terry Halvorsen, acting chief information officer.