The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.
The SIGNAL Blog
Students from 27 middle schools across New Mexico—some who might aspire to be automotive engineers—will vie this Saturday for top honors in the New Mexico Electric Car Challenge held in Albuquerque.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
Many information technology organizations are taking a different approach to cybersecurity that radically reduces the time to detect and respond to attempted cyber attacks.
A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."
Time spent as a soldier, sailor, Marine, airman or Coast Guardsman—whether it’s four years or 40, on active duty or in the reserves—instills a sense of working toward a common goal that is often rare in the civilian world.
SIGNAL's real-time reporting will begin with the opening remarks by Gen. Vincent K. Brooks, USA, December 9, and will continue throughout the conference.
The U.S. Defense Department’s research agency has simplified the process for researchers trying to break into the federal marketplace and earmarked up to $700,000 in seedling funds for cutting-edge biotech ideas.
NC State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source. The technology is designed to help emergency personnel find and rescue survivors in the aftermath of a disaster.
Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.