Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
U.S. Intelligence Community Faces Four Major Challenges
The DNI ascribes problems to a changing and more hostile world.
Image
Russia Employs Full Range of Information Warfare Capabilities
Failure is not an option in the cyber realm.
Image
Disruptive by Design: The Real Dangers of Trojans Are Not What You Think
Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.
Research Organization Fights Techno- Terrorists
Iraqi insurgents are not the only adversaries adept at adapting—cybervillains also have learned to transform their tactics and circumvent new ways of protecting information infrastructures. Despite improvements in security software and practices, crackers, criminals and even nation-states continue to take advantage of an unsecured Domain Name System, flawed technologies and minimal testing and commercialization options for researchers.
Preparing for Predatory Peripherals
Your mouse may no longer be a friendly. That goes for your keyboard as well. Cyber security researchers have reportedly found a way to create peripherals that can be programmed to steal and transmit data when certain actions or keystrokes are performed.
Army Renews ARCYBER’s Lost Limited Acquisition Authority
The authority enables rapid procurement of cyber technologies.
Image
Cyberspace Spawns a New Fog of War
Military commanders long have complained of limited situational awareness because of faulty intelligence and disruption of their lines of communications. Gen. Carl von Clausewitz called this “the fog of war.” Today’s military commanders face a distinctly different threat to their lines of communications because cyberwar casts a shadow far beyond Gen. Clausewitz’s conventional battlefield and the rules of engagement that govern armed conflict.
Coast Guard To Empower Maritime Cybersecurity
The Department of Homeland Security tackles maritime cybersecurity, enforcing regulations to counter rising threats.
Image
Conflicting Demands Vex U.S. Intelligence Community
Greater transparency must be weighed against evolving mission demands.
Image
Experts Warn of Maritime Industry’s Cyber Vulnerabilities
Maritime businesses invest in drones and unmanned vessels, expanding cyber exposure.
Image