Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Air Combat Command Pursues Zero Trust Architecture
The command has two pilot programs underway to employ the cybersecurity tool.
Image
DISA Moves Beyond Conventional Biometrics
Officials are creating a prototype that will verify mobile user identity based on life patterns.
Image
DHS Navigates the World of Vehicular Digital Forensics
Cars used by terrorists and other criminals yield information about their drivers.
Image
Funding Constraints Help Define Dutch Military Networks
Faced with budget restrictions amid broadening mission requirements, the Netherlands military is adopting new tacks as it sets sail into a strong network-centric future. Its already sophisticated systems are being modernized to meet a growing international mission set that relies heavily on interoperability in joint and coalition operations.
The Cyber Implications of Acquisition Speed: Part III
Full and open competition can improve federal procurement.
Slow Speed Ahead for Contractor Compliance
New DFARS cybersecurity regulations are demanding, especially for small businesses, but solutions exist.
The Bottom Line: We Saw Them Coming
Network architects won't say they told you so, but ... they told you so.
Innovation, Efficiency Drive Defense Information Systems
Pouring a quart out of a pint jar is the new way of military networking.
Image
The Cyber Implications of Acquisition Speed: Part V
Software vendors should support government products in the same way they support commercial products.
A More Aggressive Approach to Cybersecurity
An industry official urges the Department of Defense to become more proactive rather than reactive when it comes to protecting networks and data.
Image