Table of Contents: May 2017
Solving the Key Puzzle For the Future of Encryption
Advanced processing capabilities could outpace innovative data security solutions.
Defending Against the Quantum Future
NIST hurries to define new encryption standards before current ones become extinct.
When Confidentiality and Security Collide
Defense researchers are developing exotic cryptography techniques that marry privacy and data sharing.
Doing The Math For Better Encryption
A breakthrough formula for generating random numbers may be the key to cybersecurity.
The Army Trains Its Sights On Network Ownership
A new initiative provides soldiers extensive knowledge of information systems and returns control to users.
Putting Hackers on Notice
The United States needs a stronger deterrence message to fend off a changing array of cyber enemies.
I Spy With My Cyborg Dragonfly
Fitted with tiny, flight-controlling backpacks, insects become living drones.
Intelligence Threats Increase in Complexity
A CIA founding father warned that other nations will suffer insider leaks.
A Triple Threat to The Private Sector
Terror, cyber and insider attacks must be defended against as much as their accompanying liabilities.
DISRUPTIVE BY DESIGN
Millennials Rewrite Workplace Rules
Encryption Policy Debate Pits Privacy vs. Security
Army Battles Adversaries, Limitations in Cyberspace
AFCEA EDUCATIONAL ACTIVITIES
Shop for STEM Supports Teacher Grants