Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Defense Secretary Ashton Carter is Off to a Good Start
This Pentagon leader knows well how technology can serve the defense base.
Competition Offers Teens Insight into Cyberdefense
The nation's largest, simultaneous high school cybersecurity competition is back, and students across the nation have until October 8 to sign up. Winners will walk away from CyberPatriot III with scholarships and the knowledge of how to defend computer networks against real-life threats.
Buyer Prepare
New GSA contract requires agencies to consider processes, benefits and change management.
Image
GEOINT Moves From Stovepipes To the Cloud
A wealth of unclassified data compels the NGA to map out a new knowledge-based future.
Image
NATO's New Coordinating Command Advances
The alliance is employing a key enabler to improve the movement of troops and equipment across Europe.
Image
Soldiers Show Off Capabilities at Warfighter Exercise
U.S. Army officials highlight three new innovations tested during a Warfighter Exercise.
Image
Revolutionizing Operations: Data-Centric Plans, AI and Tech Concerns Revealed
The Army's data-driven transformation emphasizes cybersecurity, hardware protection and AI integration.
Image
Center Looks for Trouble
The team that provides combatant commands with lean, agile, responsive and collaborative thinking has taken on a mission of assessment and analysis of an operational and strategic magnitude. Its goal is to integrate information and analysis into the common operational picture quickly enough to get inside a commanding officer’s decision-making cycle. To achieve this objective, the group is relying on expertise that is available not only in the military but also in industry and academia.
MOUNTING A VIGOROUS DEFENSE IN DEPTH
I know some guys who are really good at external validation of enterprise security posture. There are some folks so good that nothing will totally stop them. The history of computer science makes me think world-class-best folks like that will always be with us and there will never be a system that is perfectly defendable. But still, there are steps you can take to dramatically enhance the security of your enterprise. I've reviewed some of these before, like ensuring endpoints are protected from malware, using defense in depth to enhance your security posture, mitigating IPv6 security threats, and studying the threat. With this post I'd like to mention another capability that belongs in your defense in depth tool suite: the Microsoft Security news, products, updates and tools site at http://microsoft.com/security The security site at Microsoft is a way for enterprise and home users to tap into three key security centers: The Microsoft Security Engineering Center, The Microsoft Security Response Center, and The Microsoft Malware Protection Center. It is good to know all three of those, but the best way to interface with them, in my opinion, is through the security site...