Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo


Secure Telephony Enters Handheld Cellular Realm

June 2000
By Robert K. Ackerman

The communications sanctity inherent in secure telephone units is migrating into the cellular arena with a new generation of handheld devices no larger than conventional commercial mobile telephones. These telephones are designed to provide high-level government and military secure cellular communications while also being able to serve the commercial arena.

Internet-Based Attack Risk Distracts Organizations From Internal Trouble

August 2000
By Henry S. Kenyon

Threats to government and private sector computer systems continue to evolve in new and unexpected ways. These challenges come from a variety of groups such as hackers, terrorists and, increasingly, radical political and social activists.

Intrusion Detection Technology Closes in on Hackers

August 2000
By Christian B. Sheehy

Protecting the average business computer from a barrage of malicious network intrusions is high on the priority list of many of today's World Wide Web-based organizations. In a move to step up research in network security technology, the U.S. Navy is contracting out a three-year effort to pursue security systems development.

Computer Security Experts Warn of Growing System Vulnerabilities

August 2000
By Robert K. Ackerman

The spread of information and networking technology into virtually all corners of the globe is spawning new opportunities for criminals and terrorists to wreak havoc through the Internet. The dichotomy of system complexity and ease of individual use has created a target-rich environment across the entire realm of cyberspace.

Debunking Information Security Myths

February 2005
By Maryann Lawlor

Viruses, worms, hackers, spam, disgruntled employees, flawed software, terrorists-cyberspace is rife with danger, but defending information has some pitfalls of its own. Information security specialists are the front-line warriors in this battlespace, and they may be making important decisions about which weapons to use based on misconceptions often promulgated by security product vendors. Industry experts have taken a closer look at some commonly held information assurance beliefs and claim that many are little more than myths.

New Tricks for Old Threats

January 2001
By Henry S. Kenyon

Rapid technological change is a double-edged sword. The latest developments that allow faster computing and increased data flow also put critical national infrastructures within reach of any potential adversary with a modem.

For Security, the Eyes Have It

March 2001
By Maryann Lawlor

Passwords will become passé as the military moves toward fingerprint reading, iris scanning and voice recognition as gateways to many of its information and weapon systems. As a result of legislation enacted last year, plans are moving forward to use biometrics for identity verification wherever possible. The goal of the coordinated effort is to shore up information assurance throughout the armed forces by replacing the vulnerable password system with technologies that identify "you as you," according to security experts.

Regulators Change the Locks In Cyberspace

Apri 2001
By Henry S. Kenyon

The U.S. government is poised to adopt a new encryption standard that will replace existing ciphers used in secure, nonsecret communications. The algorithm is compatible across a variety of software and hardware applications and in limited-memory environments such as smart cards.

Commercial Forces Unite to Combat Cyberthreats

April 2001
By Maryann Lawlor

The military is not the only entity that knows information is a powerful weapon. Companies that both develop and depend on communications technologies now recognize that strength increases with numbers and cooperation benefits individual firms and protects overall economic growth. Despite the competitive nature of commerce, information operations have moved from the public to the private sector.

Cyberguardian Keeps Hackers, Insider Threats at Bay

June 2001
By Henry S. Kenyon

Smart hardware will allow administrators to foil intruders and internal attackers before they can cripple computer systems. The firewall, embedded within a network interface card, creates a tamper-resistant security layer that cannot be subverted or deactivated like traditional software-based defenses. When installed on desktop computers and servers throughout an organization, the cards selectively permit or deny certain types of activities at the department, office or individual levels.


Subscribe to RSS - Security