Search Results for "" Cyber ""
U.S. Marines Testing Cyber Warfare Technologies on the Front Lines
U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.
Cybersecurity Center of Excellence Seeks Input on Securing Medical Devices
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
Files of More Than 40,000 Federal Workers Breached in Cyber Attack
Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.
Cybersecurity Breaches Making Users More Savvy, but Vulnerabilities Persist
Sensational data breaches such as the recent hacking of Sony Pictures Entertainment, in which employees’ personal information such as Social Security numbers, salary details and emails not only were stolen but publicly disseminated, make for great headlines and capture people’s attention—mainly because the public can relate to the breaches. The headline-grabbing attack leaves people thinking that this could happen to them.
DISA Issues Draft of Revised Cloud Security Requirements, Seeks Industry Input
Behavioral Analytic Tools Could Shore Up Cybersecurity Vulnerabilities
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
Guest Blog: How Modernizing the JIE Can Make It a Success
Two years ago, the Defense Department developed the Joint Information Environment framework. Since then, key stakeholders and drivers have worked to realign, restructure and modernize the department’s information technology networks to increase collaboration while reducing the cyberthreat landscape.
Protecting Soldier Networks From Threats, Inside or Outside

Cyber Commander Expects Damaging Critical Infrastructure Attack

CERDEC Sets Priorities as It Prepares for New Environments
