Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3716 Results
NOTES ON INTELLIGENCE - NEW DOMAINS IN NATIONAL SECURITY
I hope everyone who attended the Fall Intelligence Symposium at the National Reconnaissance Office shares my view that even within the high standards set for these events over the years, this was something special. First of all, the audience heard from an extraordinary set of speakers, from the DNI through the Director and Deputy Director of the NRO, and on and on. Consistent with our tradition, our guests had the opportunity to speak candidly in a non-attribution environment, and it was apparent they enjoyed the freedom to do that. In addition, we had the privilege of honoring two distinguished intelligence professionals, the late Dennis Fitzgerald and Lawrence Gershwin, the longtime National Intelligence Officer for Science and Technology. Finally, we had the opportunity to do this within the context of helping the NRO celebrate its 50th anniversary. It was especially fitting that we could honor Dennis Fitzgerald at an important moment in the history of the organization he helped lead and build over many years.
Navy Builds Future Network Environment
The next generation of the U.S.
Moving Beyond Passwords
Hardware and biometrics are up next in the evolution of digital identity verification.
Image

Surveillance Slips Into Cyberspace
Allied intelligence agencies engaged in computer-to-computer signals intelligence exploration are closely examining Internet protocol network intercepts and forensics analysis as a new weapon in the war against terrorism. Traditional signals intelligence professionals, who have shied away from this type of intelligence gathering for more than a decade, are realizing that the computer-to-computer intelligence gap can be filled. The fact that computer-to-computer signals intelligence is a weakness in current allied intelligence-gathering efforts is no secret. But after decades of denial, the intelligence community and emerging technologies are changing the old ways of looking at network surveillance.
CISA Creating Zero-Trust Playbook for Government
Agencies may transition slowly to the new security principle.
Image

Social [Media] Security
Dr. Scott Wells, co-founder and chief architect of the Social Media Security Professional (SMSP) certification, Ultimate Knowledge Institute, shares some little-known facts about the threats social media pose to organizations and individuals.
HOW GOOD SHOULD INTELLIGENCE BE?
The last days of 2009 marked three important events in the history of American intelligence. The first is the fifth anniversary of the Intelligence Reform and Terrorism Prevention Act, the legislation creating the Director of National Intelligence, among other provisions. The second is the attempted destruction of an airliner approaching Detroit International Airport.
Disruptive by Design: Biometrics Could ID Criminals Before They Act
With modern society’s infatuation with selfies, facial recognition technology could easily be used to identify common physical traits of criminals, pinpoint communities dominated by potential offenders and then help determine where to focus crime-prevention programs.
Tackling Big Data With Small Projects
The U.S. Army moves toward the intelligence community common environment.
Image
