Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3841 Results
A Taste of Reality Puts the Focus on Critical Infrastructure
As I write this, we are experiencing some nearly unprecedented oppressive weather in the Washington area. About one week ago, we had a series of violent thunderstorms that caused extensive damage and knocked out power to more than 1.5 million electrical customers—comprising millions of people—in Washington, D.C., Maryland and Virginia. Many communications systems also failed, either because of damaged infrastructure or loss of power. This includes telephone, cable and cellular systems along with their accompanying processing and switching facilities. Credit and debit cards, along with ATM cards, were useless in many places just when people needed them to buy vital goods for surviving the blackout. More seriously, the 911 emergency call system ceased to function in areas where it was needed the most. And, in some locations, potable water was a problem because power was lacking for pumps and water treatment.
Book Review: Cybersecurity and Cyberwar
Cybersecurity and Cyberwar: What Everyone Needs to Know
By P.W. Singer and Allan Friedman Oxford University Press, January 2014 (Brookings)
JFHQ-DODIN 10 Years On: Imposing Costs to Adversaries
The operation of the U.S. Department of Defense’s network of networks becomes even more sophisticated and wide scale, leader says.
Image
Protecting Your Own
A soldier in harm’s way has no greater ally than other soldiers watching his or her back. That trust is the key component of a good unit. Usually, the bond of trust that only members of the military share is built during training and missions. That trust is priceless in theater, but what about other environments? Dark alleys, sketchy neighborhoods, the bleachers of an away game – soldiers have that covered. But, who has your back in cyber space?
Airmen Fix Energy on the Horizon
The U.S. Air Force is planning an energy future in which it both leads and follows the technology efforts of others. Improved efficiencies as well as alternative technologies will play key roles in giving the Air Force supremacy in energy as well as in the air. The future of the Air Force’s fundamental research into energy through the year 2026 is outlined in a report designed to maintain the service’s position as the pre-eminent entity in air and space. Titled Energy Horizons, the paper offers plans for power-source science and technology (S&T) not only in the expected air and space arenas, but also in cyberspace and infrastructure.
Cyber Technology Transitions From the Lab to the Street
National laboratory research promises to transform cybersecurity.
Image
The Exception Becomes the Rule
Researchers at the U.S. Army Research Laboratory and Electronic Warfare Associates Incorporated have partnered to implement a new intrusion detection architecture designed to defend against advanced persistent threat. The architecture, a component of the Network Attack Characterization, Modeling and Simulation Testbed, is an Army Research Laboratory computer network defense enclave that secures against cyber adversaries by providing rapid flexible responses to new threats. The program was launched in 2008 to combat the growing threat of cyberwar by improving intelligence sharing and computer network defense tactics among the U.S. Defense Department, cleared defense contractors, universities and private companies.
Closing All DOD’s Cyber Doors with Zero Trust
Fulfilling the zero trust vision is a multistage effort.
Image
Halvorsen Offers a Different Take on the Insider Threat
The Defense Department CIO says incidents have been costly but few.
Image