Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Cyber Technology Transitions From the Lab to the Street
National laboratory research promises to transform cybersecurity.
Image
The Exception Becomes the Rule
Researchers at the U.S. Army Research Laboratory and Electronic Warfare Associates Incorporated have partnered to implement a new intrusion detection architecture designed to defend against advanced persistent threat. The architecture, a component of the Network Attack Characterization, Modeling and Simulation Testbed, is an Army Research Laboratory computer network defense enclave that secures against cyber adversaries by providing rapid flexible responses to new threats. The program was launched in 2008 to combat the growing threat of cyberwar by improving intelligence sharing and computer network defense tactics among the U.S. Defense Department, cleared defense contractors, universities and private companies.
Closing All DOD’s Cyber Doors with Zero Trust
Fulfilling the zero trust vision is a multistage effort.
Image
Halvorsen Offers a Different Take on the Insider Threat
The Defense Department CIO says incidents have been costly but few.
Image
The Information Assurance New Year's Resolution List
Ten things to keep in mind about information assurance in 2009.
Hope for a Holy Grail of Continuous Monitoring
The most misunderstood cybersecurity solution holds promise.
Image
The Price of Choosing Software Profitability Over Security
Expert sees cyber attacks getting worse long before any improvements.
Image
Navy Uses Information Technology To Enable Information Technology
Many of the challenges wrought by new capabilities can be met by information innovation.
Image
Information Security: Weighing Threats, Managing Risks
Information security is more than just a fact of life-it is a guarantor of life. Government, the military, the commercial sector and the public are so dependent on cyberspace that any interruption or degradation can be chaotic or even catastrophic. And, scarcely a day goes by without the public learning of either some new intrusion into key government systems or a discovered threat to personal information. SIGNAL Magazine's July 2009 issue examines the challenges of achieving information security from the burgeoning menace to potential solutions-and their own ramifications.