Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Three Steps for AI Success
Artificial intelligence requires infrastructure, collaboration and training.
Image

Changing the Game in Security Is a Key Role for C4ISR
AFCEA Europe’s second-largest flagship event, TechNet Europe, featured the latest topics in cybersecurity and command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR).
Image

Keeping Malicious Code at Bay
Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.
Training Machine Learning for Cyberthreats
Cybersecurity operations centers need artificial intelligence technologies.
Image

New Technology Approaches Can Solve Complex U.S. Navy Problems
Software-defined networking, virtualization and orchestration enable C2D2E afloat and enhance security, capability and flexibility ashore.
Image

Information Sharing Takes on New Shape
The intelligence community’s new cloud technology architecture promises increased mission agility and lower operating costs.
Image

DISA Targets Individual Expertise to Boost Diversity
Looking within and outside are complementary efforts for the same goal.
Image

The Army Focuses on Key Product Development Criteria for Industry
The U.S. Army introduces principles for industry, stresses training and emphasizes flexibility and zero-trust networks at AFCEA’s TechNet Augusta.
Image
Cybercriminals Find New Ways to Exploit Vulnerabilities
Strategic efforts to access top executives’ computers and to steal source code and intellectual property are taking cybercrime beyond simple financial theft. Criminals and foreign organizations are launching more sophisticated and targeted phishing and malware attacks, resulting in more prevalent infiltrations in 2009. Cybercriminals often target social media sites, such as Twitter and Facebook, and use an individual’s personal data to fool friends and colleagues into revealing valuable personal and corporate data.
Visibility and Analytics: Keys to Zero-Trust Success
Sponsored Content
Image
