The U.S. government is just as vulnerable to cyberthreats—if not more so—compared to two years ago, according to a new survey of federal information security professionals. Nearly half of approximately 1,800 respondents indicated that security has not improved in the federal space, while another 17 percent stated their organization’s security posture is actually worse off.
SIGNAL Online Exclusives
The Finding Individuals for Disaster and Emergency Response device lived up to its name in Nepal, detecting signs of life that led to the rescue of four men trapped under as much as 10 feet of bricks, mud and other debris following the devastating April 25 earthquake in the area.
Imagery captured from UAVs can be up to 10 times less expensive than from manned aircraft or satellites, prompting government agencies and private farmers alike to investigate using the economical method. But piecing the puzzle hasn't always produced a workable solution.
Government and academia researchers made a revolutionary breakthrough in the field of thermal energy, placing scientists on a path toward the development of technology that can both harness and store energy from heat.
The Pentagon’s new cybersecurity strategy for the first time publicly addresses the department’s option to resort to offensive cyberwarfare tactics as a means to safeguard the military’s information networks. The Department of Defense Cyber Strategy, the second in four years, guides the development of the military’s cyber forces.
Modern commercial airliners could be at risk of in-flight cybersecurity attacks through a vulnerability posed by passengers using planes’ wireless systems, warns a federal watchdog agency.
The U.S. intelligence community's leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected.
On the same day that news headlines implicated Russian hackers in a significant cyber attack and breach on the White House, officials attending a cybersecurity summit Tuesday in the nation’s capital warned of the uptick in the number of nation state-sponsored cyber attacks against the U.S. government and businesses.
The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency.
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
It will not be long before adversaries narrow the superiority gap the United States holds over others in satellite technology. Rivals are unencumbered by bureaucratic stagnation and can rapidly leverage commercial technology for military use, according to one panelist speaking at the Satellite 2015 symposium in Washington D.C.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities.
Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.
The U.S. military can get a bird's-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles. Now, DARPA is asking for technology that would let the military get into buildings without having troops actually step foot inside.