The Internet of Things (IoT) and big data may combine to generate the greatest cyberthreat of all.
The SIGNAL Blog
Contract protests can be the fault of government, contractors or the process itself. For government, it may be something as simple as lack of understanding on the part of contracting authorities.
If the confession of evil works is the beginning of good works, as Saint Augustine is quoted as saying, today might prove quite cathartic. It’s World Password Day!
Does artificial intelligence (AI) pose a threat to the human race, as many notable technologists recently have suggested? And what should be its role in the intelligence community?
Personal identifiable information (PII) constantly is under threat of being compromised. One solution may be to create vaults that grant access to authorized organizations. But will it work, or even be embraced by the public?
Twenty companies will participate in a trade mission with Romania and Poland.
Proposed cybersecurity legislation is a good start, but much remains to be done to secure the nation from cyberthreats—starting with trust and cooperation among diverse organizations.
It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.
Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment.