Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
NATO's New Coordinating Command Advances
The alliance is employing a key enabler to improve the movement of troops and equipment across Europe.
Image

Soldiers Show Off Capabilities at Warfighter Exercise
U.S. Army officials highlight three new innovations tested during a Warfighter Exercise.
Image

Revolutionizing Operations: Data-Centric Plans, AI and Tech Concerns Revealed
The Army's data-driven transformation emphasizes cybersecurity, hardware protection and AI integration.
Image
Center Looks for Trouble
The team that provides combatant commands with lean, agile, responsive and collaborative thinking has taken on a mission of assessment and analysis of an operational and strategic magnitude. Its goal is to integrate information and analysis into the common operational picture quickly enough to get inside a commanding officer’s decision-making cycle. To achieve this objective, the group is relying on expertise that is available not only in the military but also in industry and academia.
MOUNTING A VIGOROUS DEFENSE IN DEPTH
I know some guys who are really good at external validation of enterprise security posture. There are some folks so good that nothing will totally stop them. The history of computer science makes me think world-class-best folks like that will always be with us and there will never be a system that is perfectly defendable. But still, there are steps you can take to dramatically enhance the security of your enterprise. I've reviewed some of these before, like ensuring endpoints are protected from malware, using defense in depth to enhance your security posture, mitigating IPv6 security threats, and studying the threat. With this post I'd like to mention another capability that belongs in your defense in depth tool suite: the Microsoft Security news, products, updates and tools site at http://microsoft.com/security The security site at Microsoft is a way for enterprise and home users to tap into three key security centers: The Microsoft Security Engineering Center, The Microsoft Security Response Center, and The Microsoft Malware Protection Center. It is good to know all three of those, but the best way to interface with them, in my opinion, is through the security site...
Good, Better, Best
Leadership from the In-side out.
Image

WHO IS THE MOST INFLUENTIAL PERSON IN THE IC TODAY?
New Years is always a good time for top ten stories so I thought I would go this way for the January edition of Mazz-INT. I quickly realized, however, there is little new I that could add to stories such as Wikileaks, the failed jihadist bomb attacks, intelligence issues in Afghanistan, budgetary pressures on the IC, or the swap out of Clapper for Blair as DNI that would pique this readership's interest.
Air Force Selects Firms for $950 Million JADC2 Capability Effort
Altamira Technologies Corp., McLean, Virginia (FA8612-21-
Jump-Starting the Dark Grid
Distributed power may be the key to recovery from a massive blackout.
Image

Securing the Castle with Network Modernization
Network improvements secure the gates against intruders.
Image
