Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
Paper-Saving Effort Impacts Savings Bonds
The U.S. Department of Treasury recently announced an end to the sale of paper savings bonds through employer-sponsored payroll savings programs. Find out how this change could impact the way you save in the future.
Venizelos, Smith Named to FBI Positions
George Venizelos has been named special agent in charge of the FBI's Philadelphia Division. Debra E.
Wray To Direct Maritime Partnership Program
Rear Adm. Robert O. Wray, USN, has been assigned as director, Maritime Partnership Program, U.S.
Director of National Intelligence Funding Utah Data Center Construction
Balfour Beatty, Salt Lake City, Utah, was recently awarded a $479 million construction contract for the Utah Data Center, an office of the director of n
AAI to Support Shadow Unmanned Aircraft System
AAI Corporation, Hunt Valley, Maryland, recently received a contract valued at more than $70 million for 142 laser designator payloads and 61 bore sight tools in
Telcordia to Develop Global Optical Networks Technology
Telcordia Technologies Incorporated, Piscataway, New Jersey, recently received a $14 million contract for research and development efforts to advance the state
Northrop Grumman to Develop Electric Laser Technology
Northrop Grumman Space and Mission Systems, Redondo Beach, California, was recently awarded a nearly $9 million research and development contract for the R
Cyber Defense Strategy, From Paper to Practice
This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?
Fighting Cyber Crime: Call for Technical Solutions
In less than 30 days, the Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
MOUNTING A VIGOROUS DEFENSE IN DEPTH
I know some guys who are really good at external validation of enterprise security posture. There are some folks so good that nothing will totally stop them. The history of computer science makes me think world-class-best folks like that will always be with us and there will never be a system that is perfectly defendable. But still, there are steps you can take to dramatically enhance the security of your enterprise. I've reviewed some of these before, like ensuring endpoints are protected from malware, using defense in depth to enhance your security posture, mitigating IPv6 security threats, and studying the threat. With this post I'd like to mention another capability that belongs in your defense in depth tool suite: the Microsoft Security news, products, updates and tools site at http://microsoft.com/security The security site at Microsoft is a way for enterprise and home users to tap into three key security centers: The Microsoft Security Engineering Center, The Microsoft Security Response Center, and The Microsoft Malware Protection Center. It is good to know all three of those, but the best way to interface with them, in my opinion, is through the security site...