Search Results for "" Security ""
Personal Empowerment Worldwide Could Affect U.S. Security and Economics
The National Intelligence Council’s Global Trends 2030 report has attracted a lot of attention, but this focus often skims over some key findings.
Obstacles Loom for Pacific Realignment
The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries.
Stepped Up Cyberthreats Prompt Air Force To Rethink Training, Acquisitions
Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.
Power Grid Study Cites “Inherent Vulnerability” to Terrorist Attack, Natural Disaster
A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.
Information Security Scholarships Available
The (ISC)2 Foundation’s information security 2013 scholarship program application process will open on January 1, 2013, offering a total of $120,000 in awards to women, graduate students, young professionals and faculty.
Cyber Committee Shares Expertise
Ranging in topics from cloud computing to supply chain management, AFCEA’s Cyber Committee has published five white papers. Available on the committee’s website, information ranges from the basics to high-level recommendations that will be useful not only to organizations’ information technology personnel but also to leadership planning strategies for the future.
Hacktivism Up, Denial of Service Down in Internet Malfeasance
People with attitudes represent the current bow wave of Web attacks.
Information Technology Users and Managers Continue to Lag on Security
Either complacency or innovative attackers have lessened the effectiveness of conventional computer and network security measures.
Managing Change in the Intelligence Community
A new computing architecture emphasizes shared resources.