Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Sitting on the Verge of Technology Revolution

September 9, 2014
George I. Seffers

U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.

Cyber Can't Protect Everything

September 9, 2014
George I. Seffers

Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.

The Positive Side of Cyber

September 9, 2014
George I. Seffers

All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.

NSA Benefits Outweigh Snowden Damage

August 28, 2014
By George I. Seffers

Revelations about the NSA's monitoring practices created some fallout with the telecommunications industry and other nations, acknowledges Adm. Michael Rogers, USN, the agency’s new director. But the capabilities the agency provides eclipse the damage done.

Sponsor Blog: Riverbed Federal Offers Rapid and Easy Solutions to Counter Cybersecurity Challenges

August 25, 2014
This article is written by our sponsor Riverbed Federal. - See more at: http://www.afcea.org/content/?q=node/13370#sthash.xU7eWo3D.dpuf

This article is written by our sponsor Riverbed Federal. Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, director of technology strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs.

NIST Seeks Input on App Testing

August 22, 2014
By Maryann Lawlor

The National Institute of Standards and Technology (NIST) is preparing recommendations to help organizations leverage the benefits of mobile apps while managing their risks.

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

Policy Problems Vex Corporate
 Bring Your
 Own Device

September 1, 2014
By Sandra Jontz

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

Guest Blog: Cyber Trading Posts Ignite the Spark in Public-Private Collaboration

July 31, 2014
By Jessica Gulick

Partnerships are growing from disparate groups in search of the same goal.

Cybersecurity Challenges Vex Planners, Responders

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford.

Pages

Subscribe to RSS - Cyber