The Defense Department is employing a new design for its Next Generation (NEXTGEN) cybersecurity inspection that links the inspection to an organization’s operational mission.
Organizations want secure systems are but aren't sure how to measure their security system.
Cyber war may be raging, but the maritime services balance cyber and kinetic priorities.
The United States is fully engaged in combat operations in the cyber realm, according to a panel of military officials at the AFCEA-USNI West conference.
Chinese mercantilism poses a challenge for U.S. partners in the Indo-Pacific region.
The U.S. Defense Department is poised to implement its cybersecurity strategy focusing on near-term priorities such as endpoint management, network visibility, user authentication and cyber force development.
DISA has reorganized its technology innovation efforts into a single organization known as the Emerging Technologies (EM) Directorate.
Rob Joyce, senior cyber advisor to the director, NSA, tells attendees at CERTS that there needs to be systemic changes to fill the cyber talent gap.
The digital criminal underground is becoming stronger as hackers start to collaborate.
Across the vast Indo-Pacific region, all roads lead to cyber, according to a panel of U.S. and foreign military and civilian experts.
Technologies need to be less centralized and people need to be more informed if the Indo-Pacific region is to improve its cybersecurity, according to a panel of experts.
Being able to conduct successful operations in the Indo-Pacific region will require top-notch intelligence, and information technologies hold the key to achieving that goal.
The U.S. needs to take a multifaceted approach to cybersecurity to ameliorate problems affecting every sector of government and society.
The U.S. Indo-Pacific Command is seeking the capabilities and enabling technologies to conduct “full-spectrum cyber operations” in its vast region of responsibility.
Under a new memorandum of understanding with DHS, the U.S. Defense Department will step up efforts to share information for critical infrastructure protection.
Experts examine if and how cyber attacks can be predicted.
One cybersecurity test team reported that it caused a pop-up message to appear on terminals, instructing users to insert two quarters to continue operating.
Among the lessons learned from the U.S. Army’s Cyber Blitz: Cyber operations do not always occur in fractions of seconds.
The growth in a new kind of identity theft highlights the need for the federal government to step up and help the private sector verify citizens’ identity.
Both strategies recognize the vital nature of necessary American action in cyberspace to defend its interests.