Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Comprehensive Check Prevents Failure Fallout
Complex systems of systems require multistep security review.
Image

English Is the Borg of Science and Technology
Resistance is futile when a language assimilates other words and concepts.
Asymmetric Cyberwarfare Demands a New Information Assurance Approach
The planners of the Defense Department Joint Information Environment, or JIE, must specify the requirements that can cope with the surges in asymmetric cyberwarfare—now.
Ransomware Booms as Cyber Attackers' Method of Choice
Eruption of connected devices, poor cyberhygiene contributed to the perfect storm.
Image

We’re Writing Checks—Money Is in Our Pockets
Traditional checkbooks provide a new type of financial cybersecurity.
Image

Protecting Data Fast and Cheap in the IIoT
Industrial Internet of Things poses new flashpoint for cyber attacks.
Image

Implementing an Effective Cybersecurity Strategy
Responsive measures, definitions and diplomacy are crucial.
Image

AFCEA Answers: Cybersecurity Training Must Encompass All Work Force Needs
For more than a decade, experts have been forecasting a shortage in trained cybersecurity professionals. And the demand for those experts continues as government and industry note an uptick in the number and nature of cyberthreats. Experts weigh in for the latest episode of AFCEA Answers.
Image

Naval Information Technology Sees Opportunity Amid Frugality
Tight budgets may spawn innovation with long-lasting effects.
Coalition Operations Pose Significant Information Security Challenges
Allies and partners must be networked, but most do not have the security maturity to safeguard data.