Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3841 Results
Keeping Malicious Code at Bay
Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.
Training Machine Learning for Cyberthreats
Cybersecurity operations centers need artificial intelligence technologies.
Image
New Technology Approaches Can Solve Complex U.S. Navy Problems
Software-defined networking, virtualization and orchestration enable C2D2E afloat and enhance security, capability and flexibility ashore.
Image
Information Sharing Takes on New Shape
The intelligence community’s new cloud technology architecture promises increased mission agility and lower operating costs.
Image
DISA Targets Individual Expertise to Boost Diversity
Looking within and outside are complementary efforts for the same goal.
Image
The Army Focuses on Key Product Development Criteria for Industry
The U.S. Army introduces principles for industry, stresses training and emphasizes flexibility and zero-trust networks at AFCEA’s TechNet Augusta.
Image
Cybercriminals Find New Ways to Exploit Vulnerabilities
Strategic efforts to access top executives’ computers and to steal source code and intellectual property are taking cybercrime beyond simple financial theft. Criminals and foreign organizations are launching more sophisticated and targeted phishing and malware attacks, resulting in more prevalent infiltrations in 2009. Cybercriminals often target social media sites, such as Twitter and Facebook, and use an individual’s personal data to fool friends and colleagues into revealing valuable personal and corporate data.
Visibility and Analytics: Keys to Zero-Trust Success
Sponsored Content
Image
Technologies Creating Brave New Connected World, But At What Cost?
Symposium experts discuss pros and cons of cyber, IoT, robotics and their impact on innovation.
Image
Election Day Cybersecurity Holds
Despite adversarial threats, voting day goes off mostly without issues, cybersecurity officials say.
Image