Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3842 Results
Five Fundamental Strategies for Cybersecurity
Agencies should focus on the basics to protect against attacks.
Image
Space Information Sharing and Analysis Center Is Open For Business
The new Space ISAC will help the space community to enhance the security and resilience of space systems, leader says.
Image
Now May Be the Time for Defense Department Enterprise Email
Email is the most attractive application for leading to implementation of a Defense Department enterprise-wide strategy. Email features are generic and functionally identical. It is shared across all components. It is mature. A shared directory of addresses and the security requirements are identical and do not require innovation. Implementing email as a software-as-a-service (SaaS) by an organization such as the Defense Information Systems Agency (DISA) would offer immediate cost reductions of at least 50 percent. This would serve as a precedent for similar enterprise-wide efforts that could follow.
Adversarial Machine Learning Poses a New Threat to National Security
A rapidly growing field of technology holds significant implications for U.S. military.
Image
Behavioral Analytic Tools Could Shore Up Cybersecurity Vulnerabilities
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
Dealing With Perception vs. Reality in Election Security
Countering misinformation, disinformation and malinformation is a team effort.
Image
LandWarNet Show Daily--Thursday
LandWarNet closed with a keynote address by Gen.
Joint Information Environment Serves Five Eye Nations
Cyber Symposium 2013 Online Show Daily, Day 2
Government Works to Stop Actual Bad Guys In the Virtual Realm
The dark-hearted members of the human race have found ways to exploit innovations for their own selfish means throughout time. Now, with the ever-growing global dependence on computer networks, criminals are finding new ways to disrupt lives in the real world through enterprise in the cyber one. The U.S. Department of Justice and its allies have adapted their methods and techniques over the past decade and continue to adjust to prevent the morphing illegal activities in cyberspace, whether the computer crime itself is the full intent or only part of a larger scheme.