Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3775 Results
Free Software Can Cost Plenty
“Buyers” must beware of glitches that leave them vulnerable to attacks.
Image
The Devil Is in the Details for Future Defense Planning
Where Day 1 of West 2012 in San Diego focused on the inevitability of defense budget cuts, Day 2 broke down some of the disciplines that will be the focal point of difficult decisions in the coming months. Capabilities ranging from information security to nuclear submarines came under expert scrutiny as speakers and panelists tried to anticipate the changes that lie ahead and offer solutions to the challenges that are emerging.
Cyberdefense and DoD Culture
Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.
Writing a New Spy School Syllabus
The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.
A Global China Demands U.S. Military Global Presence
Beijing expands its global presence, showing gaps in U.S. capabilities and forcing planners to expand capabilities to face the challenge.
Image
Guarding Virtual Borders
Sky marshals, metal detectors and multiple identification checks may increase security in the corporeal world, but guarding the nation's information superhighway requires different tactics. And in the information age, homeland security must extend into the digital realm, or even a tiny crack could allow adversaries into some of the most important systems in the world today.
President's Commentary: Confronting Cyberthreats
Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
A Message From the Chairman
Having experienced more than a decade of hot and humid Washington, D.C., summers, I thoroughly enjoyed the pleasant start we experienced this year. Warm temperatures, cooling breezes and clear skies made for delightful days and evenings. It doesn’t get much better than that. Unfortunately, the political climate in no way resembles that pattern. The storm clouds of dissent have moved from the horizon to a perch directly overhead, and there are no clearer skies in the forecast.
NOTES ON INTELLIGENCE - NEW DOMAINS IN NATIONAL SECURITY
I hope everyone who attended the Fall Intelligence Symposium at the National Reconnaissance Office shares my view that even within the high standards set for these events over the years, this was something special. First of all, the audience heard from an extraordinary set of speakers, from the DNI through the Director and Deputy Director of the NRO, and on and on. Consistent with our tradition, our guests had the opportunity to speak candidly in a non-attribution environment, and it was apparent they enjoyed the freedom to do that. In addition, we had the privilege of honoring two distinguished intelligence professionals, the late Dennis Fitzgerald and Lawrence Gershwin, the longtime National Intelligence Officer for Science and Technology. Finally, we had the opportunity to do this within the context of helping the NRO celebrate its 50th anniversary. It was especially fitting that we could honor Dennis Fitzgerald at an important moment in the history of the organization he helped lead and build over many years.
Navy Builds Future Network Environment
The next generation of the U.S.