Cyber

November 14, 2012
By Robert K. Ackerman

The devil may be in the details of the electronics hardware as malware increasingly crashes hardware debuts.

November 15, 2012
By Maryann Lawlor

Ranging in topics from cloud computing to supply chain management, AFCEA’s Cyber Committee has published five white papers. Available on the committee’s website, information ranges from the basics to high-level recommendations that will be useful not only to organizations’ information technology personnel but also to leadership planning strategies for the future.

 

November 8, 2012
By Rita Boland

The U.S. Department of State is hosting its first-ever Youth TechCamp in the Pacific region later this month. Coordinated in conjunction with Pasifika Nexus and the University of the South Pacific, Youth TechCamp Fiji will offer six days of training to as many as 300 youths from various Pacific islands. Local and international technology experts from the fields of digital content creation, mobile applications and social activism will participate as well.

November 5, 2012
By Rita Boland

Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.

November 1, 2012
By Rita Boland
Ships from the Japan Maritime Self-Defense Force, the Republic of Korea Navy, and the U.S. Navy maneuver through the Pacific Ocean during a trilateral exercise. PACOM’s J-6 directorate is working to enhance coalition communications in its area of responsibility.

Cybersecurity remains the foremost concern for the man tasked with overseeing U.S. military communications technology in the Asia-Pacific area as the national defense strategy shifts focus to that region of the globe. New opportunities for technologies and programs are opening, but cyber issues continue to hold top billings in importance, and moves to shore up operations predate the recent official guidance.

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

October 1, 2012
By Max Cacas

The final conference in the TechNet Land Forces series focuses on military efforts to defend vital computer networks.

October 1, 2012
By Max Cacas

The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.

September 12, 2012
By Robert K. Ackerman

The defense information technology realm is exploding with innovation—so much so, the organizations tasked with ensuring effective information systems run the risk of losing control of both the process and its capabilities. The Defense Information Systems Agency has issued a new strategic plan that outlines its approach to ensuring advanced technology implementation without reining in innovation.

 

September 1, 2012
By Rita Boland
  A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.
  A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.
September 1, 2012
By Rita Boland
An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals.  
An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals. The Afghans traveled to Turkey as part of a NATO program to improve cyberdefense in their home country.
September 1, 2012
By Max Cacas
Patrick Grother is a computer scientist with the NIST Information Technology Laboratory, in charge of the biometric portion of the FIPS 201 update.  
September 1, 2012
By George I. Seffers

By year's end, NATO's rapid reaction team of network defenders is expected to be operational. These cyber experts will be capable of deploying within 24 hours to any NATO nation undergoing crippling attacks on its information technology infrastructure or to the battlefield in support of warfighters.

March 16, 2012
By Beverly Schaeffer

Drawing on nearly 14 years of continuing effort and achievement, the U.S. Army has successfully placed its first cyber brigade into daily operation. Will it be able to continue performing its duties as a virtual Hadrian's Wall in cyberspace? Indications thus far would confirm so. What are your impressions?

Pages