Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
Strengthening the Magic of Passwords with Multifactor Authentification
A password is repeating something you typed in the past to identify yourself in the future, but ill-intentioned actors can obtain these with increasing ease. Technology came to the rescue, sort of.
Image
U.S. Evaluating Legal Protections for Cybersecurity Technologies
A law designed for counterterrorism technologies has relevance to network capabilities.
President's Commentary: Military Diplomacy Matters in Asia-Pacific Region
Such enormity and diversity present distinct challenges in building trusting relationships for military commanders and diplomats alike.
Guest Blog: Cybersecurity Is Asymmetric
Cybersecurity leaks originate from insiders. Unchecked social computing can be the attacker's favorite means for data mining. From the standpoint of our enemies, acquiring easily accessible intelligence from inside sources can be simpler than whatever can be obtained by means of hard work to crack Defense Department barriers.
Asia-Pacific Challenges Meld War, Cooperation
“We are at war.”
Thursday, May 19, 2005
The third and final day of TechNet International 2005, AFCEA International's annual conference and exposition running May 17-19 at the Washington Convention Center in Washington D.C., included topical panels and a small business opportunity workshop. But the day's big event was what has become an annual feature at the show-the J-6 panel. The dominant topic discussed in that panel was information assurance and security, but many other issues emerged during the session.
Rescinding DISA's Cloud Broker Role To Speed Up Process
Having a single agency act as the cloud broker for the whole of the U.S. Defense Department's migration to commercial cloud services slowed the process too much, prompting a policy change to divvy up the duties among the services, says the department's acting chief information officer.
Transforming Into a Mobile-First Military
In the next conflict, mobile devices may be the only option for battlefield communication.
Image
Information Technology the New Sextant for the U.S. Navy
The service reboots amid growing global challenges.
Image