Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Research Organization Fights Techno- Terrorists
Iraqi insurgents are not the only adversaries adept at adapting—cybervillains also have learned to transform their tactics and circumvent new ways of protecting information infrastructures. Despite improvements in security software and practices, crackers, criminals and even nation-states continue to take advantage of an unsecured Domain Name System, flawed technologies and minimal testing and commercialization options for researchers.
Preparing for Predatory Peripherals
Your mouse may no longer be a friendly. That goes for your keyboard as well. Cyber security researchers have reportedly found a way to create peripherals that can be programmed to steal and transmit data when certain actions or keystrokes are performed.
Army Renews ARCYBER’s Lost Limited Acquisition Authority
The authority enables rapid procurement of cyber technologies.
Image

Cyberspace Spawns a New Fog of War
Military commanders long have complained of limited situational awareness because of faulty intelligence and disruption of their lines of communications. Gen. Carl von Clausewitz called this “the fog of war.” Today’s military commanders face a distinctly different threat to their lines of communications because cyberwar casts a shadow far beyond Gen. Clausewitz’s conventional battlefield and the rules of engagement that govern armed conflict.
Coast Guard To Empower Maritime Cybersecurity
The Department of Homeland Security tackles maritime cybersecurity, enforcing regulations to counter rising threats.
Image

Conflicting Demands Vex U.S. Intelligence Community
Greater transparency must be weighed against evolving mission demands.
Image

Experts Warn of Maritime Industry’s Cyber Vulnerabilities
Maritime businesses invest in drones and unmanned vessels, expanding cyber exposure.
Image

Trump's Budget Proposal to Significantly Boost Cybersecurity Funding
The White House's first federal budget blueprint unveiled Thursday seeks to fund the nation's cybersecurity efforts by boosting budgets of the U.S. Defense Department and Department of Homeland Security—an initiative officials say will guard against the magnified threat landscape that is only getting worse.
Image

'Skip Echelon' Thinking and Innovation for Cybersecurity
Prioritize your limited resources, focus on what is most important and defend these assets with everything you've got.
The Internet's Vulnerabilities Are Built Into Its Infrastructure
Protection of the Global Information Grid now has evolved into global asymmetric warfare. Engaging in this combat is the principal mission of the U.S. Cyber Command because the infrastructure of the Internet is fundamentally insecure, and the U.S. Defense Department depends increasingly on this cyber highway to function.
There are tens of thousands of defenders of the Internet infrastructure who must be vigilant around the clock, everywhere. Meanwhile, small teams of attackers can strike undetected whenever they choose, from wherever they may be in the world. This is why the contests between the defenders and the aggressors meet the definition of asymmetric warfare in its extreme form.