Search Results for "" Cyber ""
Consolidation Requires a Whole New Level of Network Monitoring
There is no escaping the barrage of technology and devices ever-present in our modern lives. Consider that many middle school kids today are iPhone-wielding and Fitbit-wearing youngsters. The public sector workplace is no different. Federal IT professionals must consider the sheer volume and variety of devices connecting to their networks—from fitness wearables to laptops, tablets and smartphones, with a dash of IoT and cloud for good measure.
DARPA FETT Bug Bounty
DARPA is hosting its first ever bug bounty program called the Finding Exploits to Thwart Tampering (FETT) Bug Bounty.
Cyber Gunslingers Defend Key Military and National Assets
Cybersecurity Buzzwords for 2016: Regulatory Compliance
We are little more than halfway through 2016, and it is safe to say that “regulatory compliance” are the cybersecurity buzzwords of the year. Regulatory compliance is not just a government or specialty market issue. Today, it applies to private contractors offering cloud, Internet of Things and other solutions within the federal marketplace.
Capture the Flag Competition
Cybersecurity competition at AFCEA Rocky Mountain Cyber Symposium 2020.
Coverage of Rocky Mountain Cyberspace Symposium 2023
Marine Minute: Battle in Cyberspace
U.S. Marine Corps highlights the cyberspace career field.
Defending the Digital Human Network
Be First to Find The Cyber Edge
AFCEA has launched a website on all things cyber. Visit The Cyber Edge.
McLaughlin Assigned to Air Force Space Command
Maj. Gen. James K.