Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
The Exception Becomes the Rule
Researchers at the U.S. Army Research Laboratory and Electronic Warfare Associates Incorporated have partnered to implement a new intrusion detection architecture designed to defend against advanced persistent threat. The architecture, a component of the Network Attack Characterization, Modeling and Simulation Testbed, is an Army Research Laboratory computer network defense enclave that secures against cyber adversaries by providing rapid flexible responses to new threats. The program was launched in 2008 to combat the growing threat of cyberwar by improving intelligence sharing and computer network defense tactics among the U.S. Defense Department, cleared defense contractors, universities and private companies.
Closing All DOD’s Cyber Doors with Zero Trust
Fulfilling the zero trust vision is a multistage effort.
Image

Halvorsen Offers a Different Take on the Insider Threat
The Defense Department CIO says incidents have been costly but few.
Image

The Information Assurance New Year's Resolution List
Ten things to keep in mind about information assurance in 2009.
Hope for a Holy Grail of Continuous Monitoring
The most misunderstood cybersecurity solution holds promise.
Image

The Price of Choosing Software Profitability Over Security
Expert sees cyber attacks getting worse long before any improvements.
Image

Navy Uses Information Technology To Enable Information Technology
Many of the challenges wrought by new capabilities can be met by information innovation.
Image

Information Security: Weighing Threats, Managing Risks
Information security is more than just a fact of life-it is a guarantor of life. Government, the military, the commercial sector and the public are so dependent on cyberspace that any interruption or degradation can be chaotic or even catastrophic. And, scarcely a day goes by without the public learning of either some new intrusion into key government systems or a discovered threat to personal information. SIGNAL Magazine's July 2009 issue examines the challenges of achieving information security from the burgeoning menace to potential solutions-and their own ramifications.
BUSINESS DEVELOPMENT AT THE NSA
If you've been following this blog, you know I like a varied approach to penetrating these complex agencies. Unfortunately, they do not exist to make life easy for sales folks, but I have found if we know how to work with them, there is more to be gained then by complaining.