Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Joint Information Environment Logs Successes, Faces Snags
The Defense Department’s largest
information technology effort is making unusual progress in an unorthodox approach.
Image

The New Year Abounds With Challenges and Opportunities
For most of the economies in the world, 2012 should continue to be a recovery year. This will prolong the pressure placed on budgets in defense, intelligence and homeland security. In the command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and information technology business—our focus—budget cuts often are not as great as in other sectors. However, the price is that expectations are high for information-driven savings that can be applied to reductions in the out years.
The U.S. Navy Enters a New Era of Limits
The force must contend with dwindling resources concurrent with a greater call for innovative capabilities amid a growing threat environment.
Image

Use of the Department of Defense’s ADVANA Platform Takes Root
ADVANA will assist the Department in the pursuit of CJADC2 and other key areas, leaders say.
Image

Critical Infrastructure Ripe for Attack
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
Image
![Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.](/sites/default/files/styles/4_3_small/public/media/images/migrated/circuit-traces-640.jpg?h=7c8928e8&itok=HqppXe5h)
Imperatives for Meeting Risk Management and Efficiencies Goals for Industry Classified Facilities and Information Technology
The new DNI must end vulnerability chasing and embrace cost-effective risk management for industry’s classified facility security.
Image

Labs Prepare To Exploit and Counter Quantum Computing in Crypto
Government works to validate private-sector solutions.
Image
Information Technologies Key to Naval Power
All domains are affected, and cyber success is essential.
DISA Moving Forward with OTA Contracts
Other Transactional Authority contracts focus on innovation, rapid acquisition.
Image
