Across the vast Indo-Pacific region, all roads lead to cyber, according to a panel of U.S. and foreign military and civilian experts.
Technologies need to be less centralized and people need to be more informed if the Indo-Pacific region is to improve its cybersecurity, according to a panel of experts.
Being able to conduct successful operations in the Indo-Pacific region will require top-notch intelligence, and information technologies hold the key to achieving that goal.
The U.S. needs to take a multifaceted approach to cybersecurity to ameliorate problems affecting every sector of government and society.
The U.S. Indo-Pacific Command is seeking the capabilities and enabling technologies to conduct “full-spectrum cyber operations” in its vast region of responsibility.
Under a new memorandum of understanding with DHS, the U.S. Defense Department will step up efforts to share information for critical infrastructure protection.
Experts examine if and how cyber attacks can be predicted.
One cybersecurity test team reported that it caused a pop-up message to appear on terminals, instructing users to insert two quarters to continue operating.
Among the lessons learned from the U.S. Army’s Cyber Blitz: Cyber operations do not always occur in fractions of seconds.
The growth in a new kind of identity theft highlights the need for the federal government to step up and help the private sector verify citizens’ identity.
Both strategies recognize the vital nature of necessary American action in cyberspace to defend its interests.
Despite the high risks, the federal government has failed to implement certain cybersecurity actions, GAO reports.
“The Army is the example that I hold up to my fellow sailors. The Army is doing it exactly right,” Rear Adm. William "Bill" Leigher, USN (Ret.).
Lt. Gen. Stephen Fogarty, U.S. Army Cyber Command, recommends his command and U.S. Cyber Command change their names to reflect the full range of information operation capabilities.
Congress’ NDAA for Fiscal Year 2019 takes cybersecurity a step further, with language affirming DOD’s role in defending against attacks and operating in cyberspace.
The small business winner is a Virginia firm that uncovers internal security threats before they can bite their employers.
The U.S. Navy is racing against time as well as both internal and external challenges to modernize its cyber operations.
The third and final competitor in the AFCEA Small Business Innovation Summit Shark Tank is a firm that provides advanced data security at a small level.
The United States must combat the Russian information machine.
Situational awareness is key to cybersecurity and using analytics can help create the situational awareness needed to defend the nation from adversaries.