Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Approaches, Architectures to Drive New Technologies
How you build is as important as what you build in defining the future.
Image
Detecting Anomalies
The defense community is turning to new weapons to wage war
Joint Information Environment Logs Successes, Faces Snags
The Defense Department’s largest
information technology effort is making unusual progress in an unorthodox approach.
Image
The New Year Abounds With Challenges and Opportunities
For most of the economies in the world, 2012 should continue to be a recovery year. This will prolong the pressure placed on budgets in defense, intelligence and homeland security. In the command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and information technology business—our focus—budget cuts often are not as great as in other sectors. However, the price is that expectations are high for information-driven savings that can be applied to reductions in the out years.
The U.S. Navy Enters a New Era of Limits
The force must contend with dwindling resources concurrent with a greater call for innovative capabilities amid a growing threat environment.
Image
Use of the Department of Defense’s ADVANA Platform Takes Root
ADVANA will assist the Department in the pursuit of CJADC2 and other key areas, leaders say.
Image
Critical Infrastructure Ripe for Attack
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
Image
Imperatives for Meeting Risk Management and Efficiencies Goals for Industry Classified Facilities and Information Technology
The new DNI must end vulnerability chasing and embrace cost-effective risk management for industry’s classified facility security.
Image
Labs Prepare To Exploit and Counter Quantum Computing in Crypto
Government works to validate private-sector solutions.
Image