Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Search

Search results

  1. SeKON Awarded Cybersecurity Contract

    ... contract, with options, to provide engineering, cybersecurity and configuration management support services to the program ... and solutions architecture, configuration management, cybersecurity, synthetic test data, process and software tool support, ...

    George Seffers - 09/30/2014 - 12:35

  2. Cybersecurity Technology from DHS Program Hits Market Two Years Early

    ... to support the department’s mission to improve national cybersecurity capabilities and to accelerate government-funded research into ...

    Rita Boland - 09/12/2014 - 10:47 - 0 comments

  3. Sponsor Blog: Riverbed Federal Offers Rapid and Easy Solutions to Counter Cybersecurity Challenges

    ... and security monitoring. Q: What are some of the key cybersecurity challenges facing government agencies? Applegate: ...

    Rachel Lilly - 08/25/2014 - 15:26 - 0 comments

  4. Cybersecurity Challenges Vex Planners, Responders

    ... The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a ...

    Rachel Lilly - 08/01/2014 - 08:01 - 0 comments

  5. SIGNAL Home

    ... AFCEA Corporate Members Cybersecurity Health IT Intelligence ... System Other Favorites Cybersecurity in the Work Place The Bottom Line: 4 Reasons I ...

    SIGNAL - 10/01/2014 - 08:23

  6. Big Data and Cybersecurity Key Players in Dynamic M&A Market

    ... year, with companies operating in big data analytics and cybersecurity seeing a lot of the action, experts say. "We believe [big ... to be hot for the foreseeable future. “Similarly, cybersecurity is one problem that we don’t see a real solution to any time ...

    Cyndy Hogan - 07/31/2014 - 16:52 - 0 comments

  7. A New Approach Is Needed to Protect Defense Department Cybersystems

    ... forcing the U.S. Defense Department to confront increasing cybersecurity demands without commensurate increases in available resources. Cybersecurity costs are increasing with both the complexity of new technologies ...

    Rachel Lilly - 10/01/2014 - 08:26 - 0 comments

  8. Book Review: Cybersecurity and Cyberwar

    ... June 1, 2014 Reviewed by Bob Fonow Cybersecurity and Cyberwar: What Everyone Needs to Know By P.W. Singer ... January 2014 (Brookings) Much is written today about cybersecurity, cyberwarfare and cyberstrategy. Now a new compendium, written by ...

    Rachel Lilly - 06/01/2014 - 08:34 - 0 comments

  9. Guest Blog: A Brief Look into the Cybersecurity Framework

    ... a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a ... to clarify existing guidance and help organizations manage cybersecurity risk. The National Institute of Standards and Technology ...

    Rachel Lilly - 04/23/2014 - 14:52 - 0 comments

  10. Passwords Are Killing Us

    ... Event Coverage Tags:  biometrics Cybersecurity Global Identity Summit ...

    Rita Boland - 09/17/2014 - 11:18 - 0 comments

Pages