Cyber criminals have become quite savvy in luring people to click on a link or open an attachment through spam and phishing attacks. Learn how to spot and avoid these cyber attacks with tips from the National Cyber Security Alliance.
Department of Homeland Security Secretary Jeh C. Johnson gave a report on the department’s progress in cyber hiring, announcing more than 120 new employees.
The increased focus on the sharing of information—whether among U.S. agencies or with international allies—has resulted in an expanded reliance on content management systems. These platforms enable collaboration on an enterprise-wide scale, letting groups across the Defense Department and NATO effectively share mission-critical information and documentation.
Working alongside DCNS, Thales will provide a number of advanced systems for the French navy's new frigate program.
Ensuring that deployed U.S. troops can communicate and exchange information is critical to the military’s missions. That said, there are numerous challenges in deploying the high-speed tactical networks that make this communication possible. How, for example, do you make sure these networks are available when needed? What is the best way to maintain data integrity? The accuracy of the data—such as troop location—is just as important as network availability.
NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency have launched an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes.
Engineers from Sandia National Laboratories are conducting the largest model-scale wave energy testing of its kind to harness power from one of the biggest untapped clean energy sources on Earth—and one of the hardest to capture.
Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative, a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented. The bad news is that .1 percent—or 30,000 attacks—successfully compromised a DOD cyber system.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
Federal, state and local law enforcement authorities are becoming more sophisticated about cyber attacks and devoting more resources to responding to them.
Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. It takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.
Katie Helwig, director of small business programs at AFCEA International, attended this week's Washington Technology Health and Human Services Industry Day and came away with some insights.
Naval Information Forces has developed a website for the Navy Cyber IT and Cybersecurity Workforce (Cyber IT/CSWF) Qualification Program.
Aqua Comms Ltd. announced the successful completion of a trial of Cinea’s WaveLogic 3 Extreme transmission technology on American Europe Connect, its high-capacity, transatlantic subsea cable network that connects New York to London.
Smaller businesses have become bigger targets for cyber attacks. Now more than ever, owners must quantify the risk and what could happen as a result of a successful cyber breach.
Five states accounted for just over half of the $255 billion of research and development (R&D) companies paid for and performed in the United States in 2013, according to a new report from the National Center for Science and Engineering Statistics.
October is National Cyber Security Awareness Month and the U.S. Department of Homeland Security hopes to use the month-long campaign to inform everyone—individuals, nonprofits, the military, private industries, educational institutions and governments—about cybersecurity.
Networking is the last discipline to be touched by the Defense Department's major disruption for its information technology overhaul, which is where software-defined networking and network functions virtualization come into play, writes Juniper's Tim Solms.
The United States Navy has tested and deployed the RQ-20B Puma small unmanned aircraft system (UAS) aboard a Flight I Guided Missile Destroyer (DDG Class), according to an AeroVironment Inc. announcement. Some of these exercises included the use of the company’s fully autonomous system to recover the aircraft aboard a ship.