Search Results for "" Cyber ""
Management Is Key for GIG 3.0
Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.
The Dominant Realm of This Century Will Be Virtual
Airpower dominated the 20th century, but cyberpower will dominate the 21st century. Change is outstripping conventional patterns as technologies race capabilities.
Military-Style Network Measures Needed to Secure Infrastructure
Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.
New Capabilities, Same Old Issues Define Social Media
The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.
Forget Firewalls, Focus on Understanding
Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.
New Technology and Usage Are Boon to Hackers
The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaki
U.S. Needs to Be More Aggressive in Cyberspace
It's time for the United States to review its national policy and develop procedures for going after cyberspace intruders. This may be the only way to have an effect on persistent cyber attacks.
Sandia Labs to Target Cyberattackers
One of the government's premier scientific research institutions is focusing its resources on defending computer systems against cyberattackers.
Information Security Innovation Recognized
(ISC)², the not-for-profit information security professional body that administers the Certified Information Systems Security Professional certification, announced this week the winners of its eighth annual U.S. Government Information Security Leadership Awards.
Updating Cyber Laws
Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.