SIGNALScape

Guest Blog: Cybersecurity Is Asymmetric

July 14, 2010
By Paul Strassmann

Cybersecurity leaks originate from insiders. Unchecked social computing can be the attacker's favorite means for data mining. From the standpoint of our enemies, acquiring easily accessible intelligence from inside sources can be simpler than whatever can be obtained by means of hard work to crack Defense Department barriers.

Cool App-titude: PTSD Support

July 13, 2010
By Rachel Eisenhower

An app created by the online support community Hope for One aims to provide support for military veterans and their families struggling with the effects of post-traumatic stress disorder.

Pages