Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
Cloud Architecture Offers Security to Cities
Local governments can employ the tool to guard against cyber attacks and protect citizens’ privacy.
Image
The Navy Turns a Sharper Eye Toward Information Warfare
A relatively new type command accelerates servicewide efforts in a dynamic domain.
Image
Evolving Cybersecurity Faces a New Dawn
Over the last two years, we have been inundated with bad news about the state of cybersecurity. The list of concerns is growing and endless: rampant cybercrime, increasing identity theft, sophisticated social engineering techniques, relentless intrusions into government networks, and widespread vulnerabilities continuously exploited by a variety of entities ranging from criminal organizations and entrepreneurial hackers to well-resourced espionage actors. We also are facing the implications of cyberwarfare in light of last year’s cyber attacks against Estonia. In a recent speech on cybersecurity, U.S. Department of Homeland Security Secretary Michael Chertoff warned, “We’ve entered an era of new threats and vulnerabilities,” and the consequences of failure are exponentially greater.
Collaboration Key to Multinational Transformation
Technology can support change when leaders encourage innovation, culture shifts.
Image
Supply Chains May Pose Weakest Security Link
The changing character of war requires capabilities delivered without compromise.
Image
Officials Working to Deliver Innovation to DOD's Information Technology Environment
Defense IT leaders tell House Subcommittee that while progress is being made, challenges remain.
Image
Disruptive by Design: Millennials Rewrite Workplace Rules
The largest generation in U.S. history—an emerging consumer powerhouse—is making significant cultural changes centered around revolutionary, life-enhancing technologies.
President's Commentary: Critical Infrastructure Protection Is a Work in Progress
Despite everyone’s best intentions, developing a solid critical infrastructure protection policy and plan must take into account the cultural differences, privacy and the respective needs of a diverse society, coupled with a disciplined, systematic approach to critical infrastructure protection.
In Between War and Peace, the Gray Zone Hosts Conflict
It’s a place where U.S. military and diplomatic forces must operate in ambiguity.
Image
Happy Birthday to NIST's Cybersecurity Framework
Experts give approving thumbs up to the effort to protect critical infrastructure
Image