Search Results for "" Cyber ""
Cybersecurity Tactics Must be Overhauled
Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.
Computers Don Security Cloak
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks.
Agile Cyberthreats Require Flexible Security
Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.
BIT Systems Wins DARPA Cyber Award
Northrop Grumman Captures Cyber Defense Contract
Oh, What a Tangled Web They Weave...
Imitation is the sincerest form of flattery, but that's not always the case in cyberspace-where malicious website impostors steal vital data from legit site users.
5 New Year's Cyber Resolutions for Federal Agencies
From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.
Information Leaks Can Sink Agencies
Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.
Success Breeds Menace in Critical Infrastructure
The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.
Only Existing Technologies Allowed Into Future GIG
The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.