Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Behavorial Biometrics Can Supplement Traditional Identity Verification
Technology can identify users by how they use their keyboard and mouse.
Image

President's Commentary: Information Warfare Sends a New Message
Advances in technology and improvements in understanding cognitive science have led to a rediscovery of key elements of information warfare (IW).
Getting Zero-Trust Products Up to Par
The Department of Defense is making inroads with zero trust, experts say.
Image

White House Creates IT Council
The White House has created a council charged with tackling federal information technology services.
Image

THE U.S. INTERNATIONAL STRATEGY FOR CYBERSPACE
Cyberspace is interconnected technology. It is everywhere. It is an ecosystem with many stakeholders and literally billions of actors. The rise of Cyberspace as a capability has already changed us in many ways, and for years it has been having an impact on the nation's strategy. Now, after some great staffing and planning by some of the sharpest minds in our nation and after coordination with allies, industry, academia and scores of thought leaders, a new International Strategy for Cyberspace has been articulated.
Army Prepares to Open $40 Million 5G Effort
The Office of the Under Secretary of Defense Research and Engineering is supporting the groundbreaking experimentation effort.
Image

Combat Communicators Bust Paradigms
The complexities of communications in Afghanistan require the military to adopt new ways of doing business, such as creating the Afghan Mission Network rather than using traditional networks, and turning communicators into warfighters rather than mere supporters. The Afghan Mission Network directly addresses the military’s operational need to mix coalition forces down to the company level, which provides commanders with greater flexibility in task organization and the ability to fight more effectively as a true coalition. That seemingly simple need has sparked a chain of events that may change forever the way coalition forces communicate on the battlefield and the role that communicators play in wartime.
Incoming: The Peril and Promise of the Cables at the Bottom of the Oceans
As with any communications system, both risk and reward are possible. In the case of submarine cables, we should increase our ability to protect this vital portion of the global communications grid and seek innovative ways to leverage its capability.
Quantum Conquests Require Resource Commitments
The global communications race is heating up, but who’s winning?
Image

Security, AI Top List of Naval Network Integration
DevSecOps and cloud computing enable future network needs.
Image
