Search Results for "" Security ""
Not finding what you’re looking for?
10 of 243 Results
Information Security Innovation Recognized
(ISC)², the not-for-profit information security professional body that administers the Certified Information Systems Security Professional certification, announced this week the winners of its eighth annual U.S. Government Information Security Leadership Awards.
NATO Set to Strengthen Cybersecurity
NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.
NATO Set to Strengthen Cybersecurity
NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.
Managing Cyberthreats in a Standard Fashion
The cybercommunity has a new resource at its disposal to identify and mitigate issues across networks and systems. This standardization tool can make reporting problems more uniform, which should result in faster response times. Developers designed an open format that will be machine- and human-readable to automate processes, marking a divergence from standards presented in the past.
The Future Internet: Going Beyond Envelope's Edge
In the first article of a four-part SIGNAL semaphore series, the Internet of the future is envisioned, examined and its implementation explained by leaders of industry.
Global and Domestic Focus on Cybersecurity Sharpened
From the White House, to the Defense Department, and from corporate boardrooms to computer rooms across the country, the issue of protecting the networks of government and industry is increasingly leading to the development of new strategies and plans.
SAIC to Research Insider Threat Detection Sensors
Science Applications International Corporation, McLean, Virginia, was recently awarded an approximate $9 million contract for research in the detection of insider threats based on sensor data from rou
Czechs Find Balances in Electronic Security
A Czech Republic company has melded eSecurity with simpler, more streamlined eAccess, making cyberspace communications both safer and more efficient.
Automatic Electronic Identity Provides Information Security
A new approach to electronic security access employs an authentication framework designed to provide automatic identity without many of the drawbacks of traditional approaches. Instead of compromising between ease of use and effective access protection, this system aims to adopt the best of both worlds. Developed in the Czech Republic, the new approach already is in use in national and regional government organizations.