Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Guarding Virtual Borders
Sky marshals, metal detectors and multiple identification checks may increase security in the corporeal world, but guarding the nation's information superhighway requires different tactics. And in the information age, homeland security must extend into the digital realm, or even a tiny crack could allow adversaries into some of the most important systems in the world today.
President's Commentary: Confronting Cyberthreats
Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
A Message From the Chairman
Having experienced more than a decade of hot and humid Washington, D.C., summers, I thoroughly enjoyed the pleasant start we experienced this year. Warm temperatures, cooling breezes and clear skies made for delightful days and evenings. It doesn’t get much better than that. Unfortunately, the political climate in no way resembles that pattern. The storm clouds of dissent have moved from the horizon to a perch directly overhead, and there are no clearer skies in the forecast.
NOTES ON INTELLIGENCE - NEW DOMAINS IN NATIONAL SECURITY
I hope everyone who attended the Fall Intelligence Symposium at the National Reconnaissance Office shares my view that even within the high standards set for these events over the years, this was something special. First of all, the audience heard from an extraordinary set of speakers, from the DNI through the Director and Deputy Director of the NRO, and on and on. Consistent with our tradition, our guests had the opportunity to speak candidly in a non-attribution environment, and it was apparent they enjoyed the freedom to do that. In addition, we had the privilege of honoring two distinguished intelligence professionals, the late Dennis Fitzgerald and Lawrence Gershwin, the longtime National Intelligence Officer for Science and Technology. Finally, we had the opportunity to do this within the context of helping the NRO celebrate its 50th anniversary. It was especially fitting that we could honor Dennis Fitzgerald at an important moment in the history of the organization he helped lead and build over many years.
Navy Builds Future Network Environment
The next generation of the U.S.
Moving Beyond Passwords
Hardware and biometrics are up next in the evolution of digital identity verification.
Image

Surveillance Slips Into Cyberspace
Allied intelligence agencies engaged in computer-to-computer signals intelligence exploration are closely examining Internet protocol network intercepts and forensics analysis as a new weapon in the war against terrorism. Traditional signals intelligence professionals, who have shied away from this type of intelligence gathering for more than a decade, are realizing that the computer-to-computer intelligence gap can be filled. The fact that computer-to-computer signals intelligence is a weakness in current allied intelligence-gathering efforts is no secret. But after decades of denial, the intelligence community and emerging technologies are changing the old ways of looking at network surveillance.
CISA Creating Zero-Trust Playbook for Government
Agencies may transition slowly to the new security principle.
Image

Social [Media] Security
Dr. Scott Wells, co-founder and chief architect of the Social Media Security Professional (SMSP) certification, Ultimate Knowledge Institute, shares some little-known facts about the threats social media pose to organizations and individuals.