Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3779 Results
Incoming: A Handful of Heretical Thoughts
After three largely successful decades under Goldwater-Nichols, now is a good time to take a fundamental look at what we are doing in the massive Defense Department and consider some new ideas.
Contractors Are a Bull's-Eye for Hackers
Small defense contractors make big targets.
Image
RAVEN Takes Flight
The Navy is building off of the initial success of its key readiness data environment.
Image
U.S. Intelligence Community Faces Four Major Challenges
The DNI ascribes problems to a changing and more hostile world.
Image
Russia Employs Full Range of Information Warfare Capabilities
Failure is not an option in the cyber realm.
Image
Disruptive by Design: The Real Dangers of Trojans Are Not What You Think
Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.
Research Organization Fights Techno- Terrorists
Iraqi insurgents are not the only adversaries adept at adapting—cybervillains also have learned to transform their tactics and circumvent new ways of protecting information infrastructures. Despite improvements in security software and practices, crackers, criminals and even nation-states continue to take advantage of an unsecured Domain Name System, flawed technologies and minimal testing and commercialization options for researchers.
Preparing for Predatory Peripherals
Your mouse may no longer be a friendly. That goes for your keyboard as well. Cyber security researchers have reportedly found a way to create peripherals that can be programmed to steal and transmit data when certain actions or keystrokes are performed.
Army Renews ARCYBER’s Lost Limited Acquisition Authority
The authority enables rapid procurement of cyber technologies.
Image