Search Results for "" Cyber ""
Not finding what you’re looking for?
10 of 1660 Results
NIST Chooses Quantum Encryption Algorithms
The National Institute of Standards and Technology (NIST) chose encryption tools that will become part of the upcoming protocols to protect activities such as online banking and email.
Image

On Point: Q&A With Raj Iyer
Q&A with Raj Iyer, Army chief information officer, who advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.
Image

Identifying Shared Vulnerabilities and Mitigation Strategies for Cloud, Wireless and IoT
Considering common characteristics could be key to effective security.
Image

Adversarial Machine Learning Poses a New Threat to National Security
A rapidly growing field of technology holds significant implications for U.S. military.
Image

Securing Machine Learning Requires a Sociotechnical Approach
Considering AI interactions with humans, organizational structures and strategies may help defenders mitigate risks.
Image

Soldiers Supply Secure Software Solutions
The Army software factory begins with security.
Image

Experts Highlight Continued Software Vulnerabilities
National security and cyber experts see a huge problem with chronic cyber issues for widely used programs.
Image

A Phishy Breach
Over 50,000 students exposed in a data leak.
Image

Naval Applications of Machine Learning Workshop Advances AI Adoption
NAML effort continues dialogue on key digital artificial intelligence considerations.
Image

Zero Trust Key to Operational System Cyber Protection
Converging systems broadens the attack surface.
Image
