A shark-tank approach seeks to provide innovative technologies for meeting government cybersecurity needs.
Cyber attacks by these nation-states are becoming more aggressive and more dangerous.
The cyber force arm that defends DOD’s 15,000 networks with 3 million users has achieved full operational capability.
DOD to study the implications of wearable exercise devices revealing "too much information" about service member locations and military bases.
Undersea fiber optic cables—indispensable lines of communication between continents—may not be adequately protected.
Public-private partnerships will be key to the nation's success in cybersecurity.
Attendees at CERTS explored research and development supporting the cyber training environment, as well as solutions.
Leaders from all five branches of the armed forces shared their perspectives on cyber education and training at an AFCEA symposium.
According to a recent report by Proofpoint, civilian federal agencies are slow to implement email security measures.
Col. Andrew O. Hall, USA, opened AFCEA’s first Cyber Education, Research and Training Symposium with a cyberthreat update.
Google researchers found vulnerabilities in modern computer processors made by leading chip companies; the problem represents a new class of possible attack.
The holidays are a time for giving; one big data company is working to give back all year long.
AFCEA will host its first Cyber Education, Research and Training Symposium in January.
Automated systems leave out crucial cyberthreat details.
It is essential to learn from cyber attacks conducted by state and nonstate actors to define resilience for cybersecurity or cyber terrorism.
You often hear that storage is cheap, but all that stored data has an impact on the speed of the data you want.
Cyber defense and mission assurance require technology solutions, but it is equally important to look at user behavior.
The U.S. military must find ways to educate its ranks to respond to cyberthreats.
Experience in cybersecurity has opened our eyes to the need for another law of robotics.
A majority of organizations have too few security workers and nearly half do not provide adequate resources for security training.