Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Space, Cyberspace Are Stealth Threats to U.S.
Most of the nation does not fully understand the vulnerabilities they pose to U.S. security.
The Great Overcomplication
More complexity breeds more vulnerabilities.
Image

Europe To Tackle Cyber in New Law
The upcoming European Union cybersecurity regulation will alter technology company innovation and operations worldwide.
Image

Building Bridges Between Allies, Old and New
Technology and relationships go hand-in-hand in the U.S. European Command’s area of responsibility, and the head of communications at this military organization has plans for both during his tenure. Long-standing partnerships in the region need continued nurturing, and newer partnerships, such as those with former Soviet bloc nations, require encouragement. These international entities must find ways to interoperate despite having different resources to apply in an environment of blindingly fast technological advancement.
Fewer Data Centers Can Be a Good Thing
According to Vivek Kundra, the federal chief information officer, the U.S. Defense Department was operating 772 data centers as of July 30. 2010. The Office of Management and Budget defines a data center as any room that is greater than 500 square feet and is devoted to data processing. Kundra called for a 38 percent reduction in the number of data centers by 2015. Though such calls are driven by budget considerations, the metric of counting how many data centers can be eliminated is misleading. From a budget standpoint, only the reductions in the Defense Department’s $36.3 billion fiscal 2011 information technology expenses will matter.
Welcome to Social Cyber Warfare
Information-sharing platforms are a virtual treasure trove of ammunition.
Image

'Tis the Season to Watch for Scams
This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.
Software Development Protection Is Key
Commanding general lists asks of those delivering capabilities to Army Cyber Command.
Image
Federal Zero Trust Policy Implementation
One of the principal authors of the January 2022 policy to shift the U.S. government toward zero trust shares his insights.
Image

Homeland Security Conference Looks At Protecting Physical and Virtual Borders
AFCEA's ninth annual Homeland Security Conference kicked off yesterday morning with a panel session focused on cybersecurity issues. The panelists highlighted a variety of ongoing federal initiatives to defend the nation's critical infrastructure from cyberattacks and discussed some of the new threats developing in cyberspace.