Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Don't Be Asleep When Protecting Data at Rest
Watching my Cousin Billy in my backyard lying in a hammock as I prepared for my 4th of July barbecue reminded me why protecting Data at the Rest (DAR) is so important. Data at rest is a lot like Billy. Most of the time it just sits around not doing much, but it will move and work if you prod it. But, it isn’t the lack of initiative that bothers me. It’s the potential for the loss of information that keeps me up at night.
The Need for Speed With Software Delivery
President's Commentary
Image
The Bottom Line: 5 Ways Technology Has Changed the World
Cyberspace already is the new battlefield. Is the military ready?
President's Commentary: Heed the Coronavirus Wakeup Call
The coronavirus has justifiably prompted deep concerns over the security and stability of the U.S. supply chain and major portions of the critical infrastructure upon which our nation and our partner nations have become so dependent.
The Responsibility of Reciprocity
At the heart of "DoD Information System Certification and Accreditation Reciprocity" is the policy that if a system owner from any service hands a certified and accredited system to the network owner from any other service, the network owner should have the confidence that putting that system on his or her network will not result in creating information assurance or related vulnerabilities. Can we handle this?
Cybersecurity's Crystal Ball
The final day of the TechNet Land Forces East conference in Baltimore yielded signs that the task of protecting the military's and the nation's digital infrastructure is still very much a work in progress. But peering through the crystal ball, one sees signs that both the defense establishment and private industry are making decisive steps toward the goal of safeguarding the Internet from attack.
Intelligence Threat Assessment: China and Russia Are a Dangerous Team
The intelligence community believes these two authoritarian countries will pose increasing threats to U.S. interests and values.
Image
Motivation Tips for Home Schooling Parents
Making STEM careers relevant to students is key.
Image
Army on the Cusp of BYOD Era
The U.S. Army is on the verge of initiating two pilot programs—one for bring your own device, or BYOD, and one for virtualization—as part of a coming year marked by action and acceleration.
Image
Presenting ‘Dilemmas’ to Russia in the High North
The expansion of NATO Nordic warfare provides a stronger defense not only for the Arctic region but also for the alliance.
Image