Search Results for "" Security ""
Not finding what you’re looking for?
10 of 242 Results
Global and Domestic Focus on Cybersecurity Sharpened
From the White House, to the Defense Department, and from corporate boardrooms to computer rooms across the country, the issue of protecting the networks of government and industry is increasingly leading to the development of new strategies and plans.
NATO Set to Strengthen Cybersecurity
NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.
NATO Set to Strengthen Cybersecurity
NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.
Managing Cyberthreats in a Standard Fashion
The cybercommunity has a new resource at its disposal to identify and mitigate issues across networks and systems. This standardization tool can make reporting problems more uniform, which should result in faster response times. Developers designed an open format that will be machine- and human-readable to automate processes, marking a divergence from standards presented in the past.
The Future Internet: Going Beyond Envelope's Edge
In the first article of a four-part SIGNAL semaphore series, the Internet of the future is envisioned, examined and its implementation explained by leaders of industry.
SAIC to Research Insider Threat Detection Sensors
Science Applications International Corporation, McLean, Virginia, was recently awarded an approximate $9 million contract for research in the detection of insider threats based on sensor data from rou
Czechs Find Balances in Electronic Security
A Czech Republic company has melded eSecurity with simpler, more streamlined eAccess, making cyberspace communications both safer and more efficient.
Automatic Electronic Identity Provides Information Security
A new approach to electronic security access employs an authentication framework designed to provide automatic identity without many of the drawbacks of traditional approaches. Instead of compromising between ease of use and effective access protection, this system aims to adopt the best of both worlds. Developed in the Czech Republic, the new approach already is in use in national and regional government organizations.
Information Security Organization Extends International Reach
(ISC)2 has created an application security advisory board that includes information professionals from the Asia-Pacific region, Europe and the Americas. The board will recommend ways to increase awareness of software that is not secure and help software developers understand how to introduce security directly at the software development level.