Today’s young soldiers don’t want cutting-edge mobile technology in their warfighting platforms; they want that to be their warfighting platforms, says Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA. He spoke Tuesday on the inaugural day of MILCOM 2016. This year's theme, Securing Communications at the Speed of Cyber, digs into the competing priorities of speed, security and cost amid emerging challenges.
Social networks are a great way to stay connected with others, but users, particularly millennials, should be wary about how much personal information they post.
Millennials could just pose as grave a cybersecurity risk to enterprise networks as cyber criminals, according to one recent study. With more of them entering the federal workplace, they bring along technology preferences and bad behavior that threaten security of federal IT systems, according to cybersecurity developer Forcepoint.
Cyber criminals have become quite savvy in luring people to click on a link or open an attachment through spam and phishing attacks. Learn how to spot and avoid these cyber attacks with tips from the National Cyber Security Alliance.
NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency have launched an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes.
Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative, a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented. The bad news is that .1 percent—or 30,000 attacks—successfully compromised a DOD cyber system.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
Federal, state and local law enforcement authorities are becoming more sophisticated about cyber attacks and devoting more resources to responding to them.
Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. It takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.
Naval Information Forces has developed a website for the Navy Cyber IT and Cybersecurity Workforce (Cyber IT/CSWF) Qualification Program.
Smaller businesses have become bigger targets for cyber attacks. Now more than ever, owners must quantify the risk and what could happen as a result of a successful cyber breach.
October is National Cyber Security Awareness Month and the U.S. Department of Homeland Security hopes to use the month-long campaign to inform everyone—individuals, nonprofits, the military, private industries, educational institutions and governments—about cybersecurity.
Yahoo Inc. released a statement Thursday informing customers that at least 500 million user accounts were stolen from its network in 2014 by what company officials labeled a "state-sponsored actor."
When it comes to cybersecurity, many people express consternation and wonderment as to why the government cannot protect the Internet. It boils down to two things: No authorization, and officials only have visibility into a scant number of networks under their control.
Cybersecurity will remain as much of a challenge for the next administration as it has been for the current White House, especially in light of the constant barrage of cyber attacks from nation states, Director of National Intelligence James Clapper said Wednesday at the Intelligence & National Security Summit.
The guidelines for improving cybersecurity on a national scale already are in place. Now, we need commitment on a national scale to implement them.
When we think of cyber attacks, we generally picture a lone wolf hacker or Anonymous-type organization. But foreign governments also are formidable threats. Take a moment to scan the headlines and you’ll see that articles about cyber hacks on Sony Pictures Entertainment and the Democratic National Committee—among many others—have been attributed to North Korea and Russia. Blogger Mav Turner from SolarWinds offers pointers on safeguarding networks from increasingly sophisticated intrusions.
When students studying cybersecurity return to Capitol Technology University in Maryland this fall, cash scholarships donated by a former adjunct professor will aid at least two of them. Nischit Vaidya, CEO of Argotis, is driven by a love of education and a desire to give back to his community.
The Office of Personnel Management announced Tuesday it has appointed David DeVries as its new chief information officer. DeVries now leaves the Defense Department, where he serves as the department's principal deputy chief information officer under Terry Halvorsen.