Search Results for "" Cyber ""
Not finding what you’re looking for?
10 of 1644 Results
Understanding Digital and Cyber Topography Is Critical to Successful Military Operations
Nontechnical personnel must be able to conceptualize the digital demons the Signal Corps faces.
Image

President's Commentary: Confronting Cyberthreats
Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
Destructive Cyber Attacks Increase in Frequency, Sophistication
RAT infestations are just one serious threat to the critical infrastructure.
Image

Where to Focus First After the OPM Breach
The objective should be to protect the crown jewels of the U.S. government and its people—always.
NSA's Open Source Software Releases Expected to Surge
The agency is establishing a GitHub presence for sharing technology.
Image

Speed Dating With DISA
Agency officials propose a closer relationship with industry and with warfighters.
Image

AFCEA Presents Innovative Technology Awards
AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.
Commanding and Controlling the Cyber Domain
The DISA director dispels the number one myth about the agency's new operational role.
Image

Defense and Industry Officials Look to the Cyber Future
Leaders in the cyber domain outline goals and offer predictions.
Image

OPM Cyber Attack Fits Pattern of Nation-State Hunt for Sensitive Data
The significant federal government cyberbreach that let hackers swipe the personal data of more than 4 million current and former federal employees has all the trappings of a targeted nation-state attack aimed at gleaning critical information on federal workers; and current cyber protection methods might not be enough to prevent future attacks.
Image
