Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Remember to Look Next to You When Eliminating IA Threats
Have you installed the best door locks, burglar alarms and motion sensitive lights available? Is Spot, your Doberman/pit bull/wolf family pet awake, alert and a little hungry? Does your exterior resemble a bunker with siding that could withstand a force five hurricane? Then what’s that sound of something destroying your home? A possible answer; termites, the threat from within. Your mission critical data could be at as much risk.
Internet of Things Invasion
Acknowledging the inevitable IoT deluge may be only a starting strategy for the military.
Image

Range Accelerates Information Operations Planning
Combatant commanders now have a place to test, train, evaluate and develop nonkinetic alternatives to fight in the Global War on Terrorism. The Information Operations Range enables warfighters to explore military deception, electronic warfare, psychological operations, computer network operations and operations security to influence behavior or respond to an event. In conjunction with the range, commands can use Virtual Integrated Support for the Information Operations Environment tools to conduct the planning, assessment and analysis for information operations. The tools also can be employed to create events to assess new technologies and systems integration in the cyber and information operations domains.
Women in AFCEA Commemorates Its Fifth Anniversary
From humble beginnings as a subcommittee of the AFCEA International Membership Committee in 2013, Women in AFCEA has greatly expanded its offerings at both the international and chapter levels over the past five years.
Image

The Cyber Implications of Acquisition Speed: Part IV
Open architectures can accelerate acquisition.
Continued Innovation During DoD’s Zero-Trust Architecture Implementation
Sponsored Content
Image

The Future of the Army Is More About People Than Technology
TechNet Augusta speakers address the challenges facing the U.S. Army in coming years.
Navy Veers Away From Linear Modernization
Replacing older assets must be teamed with a host of new capabilities and doctrines.
Image

NIST Pilot Projects Seek to Improve Cybersecurity, Reduce Online Tax Fraud and Identity Theft
NIST awarded nearly $3.7 million for three pilot projects that seek to fortify online financial transactions and enhance privacy protections for health care, government services, transportation and the Internet of Things. The studies address specific cyber-based missions such as reducing tax refund theft, among others.
Image
