Search Results for "" Cyber ""
Cyber Operations
The networked world is beginning to discover that sharing is not always beneficial. Marauders always have been the bane of cyberspace, but now a new set of threats has emerged to imperil more than just the usual targets. Ordinary citizens now are menaced by sophisticated organizations seeking to damage society or to loot it of its funds-or both. And, as always, the network-centric military is under assault by increasingly frequent and effective cyberagents operating under foreign government control.
The Cybersecurity Challenge
Parks: No Distinct Cyberspace Command
Chilton: Cyberspace is a Domain
Point One Wins Cyberspace Contract for National Military Strategy for Cyberspace Operations
European Crises Weighs on Defense Commands Amid Continued Tech Innovation

AFCEA: Whole-of-Nation Cybersecurity Approach Needed

Consolidation Requires a Whole New Level of Network Monitoring
There is no escaping the barrage of technology and devices ever-present in our modern lives. Consider that many middle school kids today are iPhone-wielding and Fitbit-wearing youngsters. The public sector workplace is no different. Federal IT professionals must consider the sheer volume and variety of devices connecting to their networks—from fitness wearables to laptops, tablets and smartphones, with a dash of IoT and cloud for good measure.

Cyber Gunslingers Defend Key Military and National Assets

DARPA FETT Bug Bounty
DARPA is hosting its first ever bug bounty program called the Finding Exploits to Thwart Tampering (FETT) Bug Bounty.