Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
NOTES ON INTELLIGENCE
The last few months have produced much turbulence for American intelligence. What's new? In our symposia, on the website, and in Joe Mazzafro's blog, among other opportunities, we'll address at least some of that. For now, however, I want to draw attention to two very important intelligence community programs: the IC Centers of Academic Excellence (IC CAE) and the National Defense Intelligence College (NDIC).
Incoming: JIE Is an Opportunity We Cannot Afford to Let Slip Away
Implementing the Joint Information Environment (JIE) is a huge challenge but well worth the effort. It represents an opportunity to create an integrated environment for information protection, transmission and sharing.
Helping the Grid to Bounce Back
Industry and government search for for the best approach for the rapid recovery of a key element of the electrical grid in the event of an attack.
Image

Strengthening the Magic of Passwords with Multifactor Authentification
A password is repeating something you typed in the past to identify yourself in the future, but ill-intentioned actors can obtain these with increasing ease. Technology came to the rescue, sort of.
Image

U.S. Evaluating Legal Protections for Cybersecurity Technologies
A law designed for counterterrorism technologies has relevance to network capabilities.
President's Commentary: Military Diplomacy Matters in Asia-Pacific Region
Such enormity and diversity present distinct challenges in building trusting relationships for military commanders and diplomats alike.
Guest Blog: Cybersecurity Is Asymmetric
Cybersecurity leaks originate from insiders. Unchecked social computing can be the attacker's favorite means for data mining. From the standpoint of our enemies, acquiring easily accessible intelligence from inside sources can be simpler than whatever can be obtained by means of hard work to crack Defense Department barriers.
Asia-Pacific Challenges Meld War, Cooperation
“We are at war.”
Thursday, May 19, 2005
The third and final day of TechNet International 2005, AFCEA International's annual conference and exposition running May 17-19 at the Washington Convention Center in Washington D.C., included topical panels and a small business opportunity workshop. But the day's big event was what has become an annual feature at the show-the J-6 panel. The dominant topic discussed in that panel was information assurance and security, but many other issues emerged during the session.