Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3841 Results
Internet of Things Invasion
Acknowledging the inevitable IoT deluge may be only a starting strategy for the military.
Image
Range Accelerates Information Operations Planning
Combatant commanders now have a place to test, train, evaluate and develop nonkinetic alternatives to fight in the Global War on Terrorism. The Information Operations Range enables warfighters to explore military deception, electronic warfare, psychological operations, computer network operations and operations security to influence behavior or respond to an event. In conjunction with the range, commands can use Virtual Integrated Support for the Information Operations Environment tools to conduct the planning, assessment and analysis for information operations. The tools also can be employed to create events to assess new technologies and systems integration in the cyber and information operations domains.
Women in AFCEA Commemorates Its Fifth Anniversary
From humble beginnings as a subcommittee of the AFCEA International Membership Committee in 2013, Women in AFCEA has greatly expanded its offerings at both the international and chapter levels over the past five years.
Image
The Cyber Implications of Acquisition Speed: Part IV
Open architectures can accelerate acquisition.
Continued Innovation During DoD’s Zero-Trust Architecture Implementation
Sponsored Content
Image
The Future of the Army Is More About People Than Technology
TechNet Augusta speakers address the challenges facing the U.S. Army in coming years.
Navy Veers Away From Linear Modernization
Replacing older assets must be teamed with a host of new capabilities and doctrines.
Image
NIST Pilot Projects Seek to Improve Cybersecurity, Reduce Online Tax Fraud and Identity Theft
NIST awarded nearly $3.7 million for three pilot projects that seek to fortify online financial transactions and enhance privacy protections for health care, government services, transportation and the Internet of Things. The studies address specific cyber-based missions such as reducing tax refund theft, among others.
Image
Army Extends Registration Deadline for Technical Exchange
The event will inform industry about research and development efforts.
Image