Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
Cybersecurity's Crystal Ball
The final day of the TechNet Land Forces East conference in Baltimore yielded signs that the task of protecting the military's and the nation's digital infrastructure is still very much a work in progress. But peering through the crystal ball, one sees signs that both the defense establishment and private industry are making decisive steps toward the goal of safeguarding the Internet from attack.
Intelligence Threat Assessment: China and Russia Are a Dangerous Team
The intelligence community believes these two authoritarian countries will pose increasing threats to U.S. interests and values.
Image
Motivation Tips for Home Schooling Parents
Making STEM careers relevant to students is key.
Image
Army on the Cusp of BYOD Era
The U.S. Army is on the verge of initiating two pilot programs—one for bring your own device, or BYOD, and one for virtualization—as part of a coming year marked by action and acceleration.
Image
Presenting ‘Dilemmas’ to Russia in the High North
The expansion of NATO Nordic warfare provides a stronger defense not only for the Arctic region but also for the alliance.
Image
Crackdown on Supply Chain Cybersecurity
New enforcement efforts may be a compliance dream or nightmare.
Image
The Space Force Officially Stands Up the Space Systems Command
Lt. Gen. Michael Guetlein, USSF, steps into the role of the historic command’s first leader.
Image
On Point: Q&A With Shivaji Sengupta
Q&A with Shivaji Sengupta, member and CEO of MAGNUS Management Group LLC and founder and CEO of NXTKey Corporation.
Strategic Planning for War Starts With Today's Trends And Tomorrow's Possibilities
The U.S. Joint Forces Command has released a new Joint Operating Environment to address changes in trends and situations that will influence joint forces in their missions of domestic and world security. This release includes several topic areas such as the global economic situation not covered in the 2008 version. It also expands on areas that authors felt needed more attention such as cyberthreats.
