Search Results for "" The Cyber Edge ""
Telecommunications Supply Chain is Safe … for Now
Concerns about the telecommunications supply chain have led U.S. network providers to institute extensive security procedures, but government officials are looking at establishing formal guidelines for procuring network components overseas—for better or worse.
Cool App-titude: Rosetta Stone Navigator
Whether you're brushing up on a new language for an upcoming vacation or just want to practice your language skills, the free Rosetta Stone Navigator apps for iOS can help.
Navy Keeps Up With Innovation Despite Tight Budgets
If necessity is the mother of invention, innovation will be the father as the U.S. Navy seeks new methods that will allow it to continue to modernize amid harsh budget constraints.
Air Force Comes to Grips With Cyber
Roles are changing as the service reshapes its digital future.
Helping the Grid to Bounce Back
Industry and government search for for the best approach for the rapid recovery of a key element of the electrical grid in the event of an attack.
Cyber Command Redefines the Art
The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.
Air Force Strikes at New Information Challenges
Costs, security and operations requirements share top billing on priority list.
Razor Talon Sharpens Services’ Synergy
Integrating air land, and sea forces on a monthly basis saves money and creates continuity of operations.
Critical Infrastructure Ripe for Attack
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
Cyber Train as You Fight
The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.