Significant questions about systems security exist, and the U.S. industrial base may not be able to address all of the challenges effectively.
Technology experts discuss lessons the infection teaches about cybersecurity and resilience.
DISA was ready when telework became the new normal. Now, many of its pandemic-related measures are going to remain long after the virus has passed into memory.
Defense Department officials are developing an initial reference architecture for zero trust security.
Protecting critical data is paramount to the Army’s vision for command-centric network operations.
The command has two pilot programs underway to employ the cybersecurity tool.
The growth of the Internet itself may provide China with all the country needs to control it.
Chinese telecommunications technology is not being welcomed with open arms around the world, but alternatives are few.
NETCOM is now in charge of the Army’s worldwide regional cyber centers, and Army Cyber Command can increase its focus on electronic warfare and information operations.
China is offering the world a host of new telecommunications advances that would benefit Chinese companies and the country's leadership.
China's efforts to change Internet technology could deny user's some of the strongest points of the global networking system.
The U.S. Transportation Command director will take his cyberspace expertise to the Pentagon.
Traits of digital bad actors reveal clues as to their operations.
Cybersecurity experts address these topics in an AFCEA International “Small Business Cybersecurity” white paper that includes best practices, recommendations and information resources.
The Space Force announced that Space Security Challenge 2020: Hack-A-Sat would proceed as planned, but in a virtual format.
Cyber attacks on the Defense Department networks are on the rise during the COVID-19 pandemic, spurring greater demand for network situational awareness data.
The Air Force’s A-6 considers how to heighten cybersecurity in a work from home culture.
The CMMC should not be viewed by companies as a daunting endeavor, experts offer.
Aspects of the multitiered CMMC security system, currently under development, could—and should—be adopted by companies even before the measures are formalized.
Commander outlines the near-term priorities for the U.S. Air Force’s Information Warfare lead.