Search Results for "" Technology ""
A Three-pronged Approach for Fighting Foreign Cyber Attacks
When we think of cyber attacks, we generally picture a lone wolf hacker or Anonymous-type organization. But foreign governments also are formidable threats. Take a moment to scan the headlines and you’ll see that articles about cyber hacks on Sony Pictures Entertainment and the Democratic National Committee—among many others—have been attributed to North Korea and Russia. Blogger Mav Turner from SolarWinds offers pointers on safeguarding networks from increasingly sophisticated intrusions.

Raytheon to Modernize Miniature GPS Receivers
Raytheon Co., El Segundo, California, has been awarded a $52,578,245 task order for modernization of the Miniature Airborne Global Positioning System (GPS) rec
Agfa Healthcare Wins $768 Million Digital Imaging Network Contract
Agfa Healthcare, Greenville, South Carolina, has been awarded a maximum $768,000,000 fixed-price contract with econ
American Electronic Warfare Associates to Support Air Warfare Center
American Electronic Warfare Associates, California, Maryland, is being awarded a $91,293,935 indefinite-delivery/indefinite-quantity, cost-p
Army Releases Airborne Radio Draft RFP

When Air Gapping Fails: How to Protect Data
Air gapping is a security measure that isolates a computer or a network so it cannot be accessed or hacked by an external entity—a useful technique that adds a layer of security. But it's not a foolproof defense method. For that reason, blogger John Halksworth shares tips in the event of a cyber attack or a data breach.
Have Developers Become Overly Dependent on Dependencies?
One often-overlooked aspect of software development is how much programmers rely on open source libraries and packages for prewritten functions. Using the method makes a new program dependent on the existence and availability of that particular module. If that dependency is not available or the code functionality is broken, the entire program fails.

Predicting the Cyber Future

Russia Employs Full Range of Information Warfare Capabilities

Exploring the Frontiers of Quantum Knowledge
