Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Extending Cybersecurity in Romania

June 23, 2014
By Rita Boland

Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.

Start Thinking About Cloud and Spectrum Together

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

Catching Criminal Behavior on Cutting-Edge Devices

June 11, 2014
By Rita Boland

The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.

U.S. Army Researchers Beam Up Data

June 10, 2014
By George I. Seffers

Scientists at the U.S. Army's Research Laboratory have successfully demonstrated information teleportation capabilities in the laboratory using entangled photons.

Teams to Vie for $2 Million Prize in DARPA’s Cyber Grand Challenge

June 3, 2014
By Sandra Jontz

In the two-year Cyber Grand Challenge, 35 teams will vie for a $2 million grand prize and the honor of trying to devise a fully automated system to defend against cyber attacks.

Resiliency and Recovery Offset Cybersecurity Detection Limits

May 27, 2014
By Beverly Mowery Cooper

Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.

Insider Threat Survey Reveals Increased Awareness, Little Action

May 20, 2014
By George I. Seffers

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.

Virtual Capabilities at Heart of JIE Service

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.

Customer Diversity Enhances, Threatens JIE

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.

Mobility Is More Than a Physical Concept With JIE

May 14, 2014
By Robert K. Ackerman

A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.

Pages

Subscribe to RSS - Cyber