The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.
The U.S. intelligence community had a good read on the unfolding events in Ukraine and with ISIL in Syria and Iraq. However, even the community's prescience has its limits.
Snowden and Manning have done serious damage to U.S. intelligence capabilities, and adversaries are adjusting their activities in response.
Cyber intelligence sharing must change its nature as well as expand its reach.
Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.
Food, water, disease and energy increasingly are becoming disruptive to global security. Accordingly, they are moving up the intelligence priority list.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.
The first U.S. national intelligence strategy in five years is released exclusively in unclassified form.
Demands for "immaculate collection" of intelligence data are putting U.S. national security at risk.
Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.
Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).
Confyrm, GSMA and MorphoTrust win contracts from NSTIC to secure identities better.
Frank Abagnale, whose now-famous criminal exploits during his early years led him to an adulthood protecting the public, explained today what concerns him in terms of security and why people, not technology, need to be the biggest concern.
Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways.
People often don’t know who has their information, how those groups are using it or even if it’s correct.
The FBI’s Next Generation Identification system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy.
The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.
DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.
Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.
Many Army soldiers are receiving new vehicles and new tactical communications systems, but often those systems are so complex soldiers have difficulties setting up and taking down their tactical networks. The issue limits mobility on the battlefield because units hesitate to move knowing it can take hours to re-establish network communications, said Lt. Gen. Patrick Donahue, USA, the new deputy commanding general, U.S. Army Forces Command.