Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo


Search results

  1. Cybersecurity Challenges Vex Planners, Responders

    ... The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a ...

    Rachel Lilly - 08/01/2014 - 08:01 - 0 comments

  2. Sponsor Blog: Riverbed Federal Offers Rapid and Easy Solutions to Counter Cybersecurity Challenges

    ... and security monitoring. Q: What are some of the key cybersecurity challenges facing government agencies? Applegate: ...

    Rachel Lilly - 08/25/2014 - 15:26 - 0 comments

  3. Big Data and Cybersecurity Key Players in Dynamic M&A Market

    ... year, with companies operating in big data analytics and cybersecurity seeing a lot of the action, experts say. "We believe [big ... to be hot for the foreseeable future. “Similarly, cybersecurity is one problem that we don’t see a real solution to any time ...

    Cyndy Hogan - 07/31/2014 - 16:52 - 0 comments

  4. Book Review: Cybersecurity and Cyberwar

    ... June 1, 2014 Reviewed by Bob Fonow Cybersecurity and Cyberwar: What Everyone Needs to Know By P.W. Singer ... January 2014 (Brookings) Much is written today about cybersecurity, cyberwarfare and cyberstrategy. Now a new compendium, written by ...

    Rachel Lilly - 06/01/2014 - 08:34 - 0 comments

  5. Guest Blog: A Brief Look into the Cybersecurity Framework

    ... a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a ... to clarify existing guidance and help organizations manage cybersecurity risk. The National Institute of Standards and Technology ...

    Rachel Lilly - 04/23/2014 - 14:52 - 0 comments

  6. Cybersecurity in the Work Place

    When it comes to cybersecurity, companies are only as strong as their weakest link. In most ... from the office, but you should never take a vacation from cybersecurity. Keep these tips from Patrick J. Kelly in mind on your next ... available at your fingertips. DHS Office of Cybersecurity and Communications This organization is responsible for ...

    Helen Mosher - 04/25/2014 - 11:12

  7. Different Circumstances, Different Approaches Define Cybersecurity Thrust

    ... some of the severe challenges looming in meeting defense cybersecurity needs. ... Cyber officials are striving to establish guidelines for cybersecurity, yet they acknowledge that every organization in every nation has ...

    Rachel Lilly - 06/26/2014 - 08:26 - 0 comments

  8. National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

    ... to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective ...

    Cyndy Hogan - 07/14/2014 - 17:10 - 0 comments

  9. Cybersecurity Lies Take Longer than Cybersecurity Truth

    March 24, 2013 By George I. Seffers MITRE researchers develop tools against BIOS attacks. Attacks on a computer’s Basic Input/Output System (BIOS) do not receive a lot of attention, and protecting against them is...

    SIGNAL - 03/24/2014 - 11:44 - 0 comments

  10. Corporate Culture Key to Private Sector Cybersecurity

    ... management trend may impel corporations to implement better cybersecurity: lead or get out of the way. Either corporate leaders take the initiative for improving their companies' cybersecurity, or shareholders will demand their ouster following a damaging ...

    Rachel Lilly - 06/24/2014 - 19:45 - 0 comments