Security

February 27, 2013
By George I. Seffers

Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.

February 26, 2013
By George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 1

All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.

February 26, 2013
By George I. Seffers

The hotel industry has seen a greater increase in terrorist attacks than any other industry in recent years, according to Alan Orlob, vice president of global safety and security for Marriott International. Orlob offered a first-hand account of the attacks on two hotels in Jarkarta, Indonesia, in 2009.

Orlob, the luncheon keynote speaker at the AFCEA Homeland Security Conference in Washington, D.C., was staying at a Ritz Carlton hotel, which is owned by Marriott, at the time of the attack.

February 15, 2013
By Maryann Lawlor

AFCEA’s Small Business team is hosting a partnership symposium during the AFCEA Homeland Security Conference that features one-on-one meetings between large companies and small businesses to determine partnering potential.

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 31, 2013
By Robert K. Ackerman
John Smart, president of the Acceleration Studies Foundation, tells the keynote luncheon audience that dramatic change is evolutionary and inevitable.

 

 

 

January 7, 2013
By Rita Boland

The National Intelligence Council’s Global Trends 2030 report has attracted a lot of attention, but this focus often skims over some key findings.

 

January 1, 2013
By Robert K. Ackerman

The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries. The new strategic emphasis on the Asia-Pacific region poses a new set of challenges, mandating solutions that run the gamut from technological capabilities to cultural outreach and diplomacy.

November 30, 2012
By Max Cacas

Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.

November 29, 2012
By Max Cacas

A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.

November 14, 2012
By Robert K. Ackerman

Either complacency or innovative attackers have lessened the effectiveness of conventional computer and network security measures.

November 14, 2012
By Robert K. Ackerman

People with attitudes represent the current bow wave of Web attacks.

November 15, 2012
By Maryann Lawlor

Ranging in topics from cloud computing to supply chain management, AFCEA’s Cyber Committee has published five white papers. Available on the committee’s website, information ranges from the basics to high-level recommendations that will be useful not only to organizations’ information technology personnel but also to leadership planning strategies for the future.

 

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

October 1, 2012
By Max Cacas

The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.

October 1, 2012
By Robert K. Ackerman

New common goals open doors for more efficient approaches to information sharing.

Technological and cultural barriers are falling away as intelligence community organizations strive to establish a collaborative environment for sharing vital information. This thrust may be a case of an urgent need overcoming traditional obstacles as onetime rival groups embrace cooperation with the goal of building a synergistic information realm.

July 3, 2012
By Rachel Eisenhower

What if your smartphone messages could self-destruct to ensure ultimate privacy and control over the content? No, it's not a scene from a spy movie. The newly released Wickr app for iPhone encrypts communication and permanently deletes personal data from your device.

April 19, 2012

More than 70 percent of energy security professionals believe smart grid security standards cannot keep pace with the ever-changing technology and threats, according to a recent survey.

June 2011
By Petr Jirásek, SIGNAL Magazine

A new approach to electronic security access employs an authentication framework designed to provide automatic identity without many of the drawbacks of traditional approaches. Instead of compromising between ease of use and effective access protection, this system aims to adopt the best of both worlds. Developed in the Czech Republic, the new approach already is in use in national and regional government organizations.

August 17, 2009
By Maryann Lawlor

Companies now can acquire certified identity credentials that facilitate employees’ physical and logical access when they work with the U.S. Defense Department, other government agencies and government-affiliated organizations. A biometrics-infused card authenticates a person’s identity using bar codes, a digital photograph and fingerprints. Through a not-for-profit association, contractors become part of an operational system that can exchange credential information with the government.

Pages