Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Fair Elections Depend on Information Assurance
Security standards would protect citizens’ rights and freedoms.
Image

Transportation Security Tackles Network Security
The Transportation Security Administration is doing more than just making sure travelers have a safe trip; it also is ensuring the security of the data, video and voice communications that travel on its network. In response to the deficiencies raised in a report issued by the U.S. Department of Homeland Security's inspector general last year, the administration acknowledged its network flaws and moved forward quickly to correct them. Among the issues that needed to be addressed were policies, processes and procedures concerning security testing, audits, and configuration and patch management.
Enabling Operations With Cross-Domain Transfer and Access
Sponsored Content
Image

'Exponential Thinking' Will Propel the U.S. Beyond its Adversaries, Adm. Harris Says
It is imperative that the United States—government and private companies alike—begin using its inherent innovative spirit to think exponentially and develop technologies that will save time, dollars and lives while defeating the nation's adversaries, said Adm. Harry Harris, USN, commander of U.S. Pacific Command. Exponential thinking were the buzzwords of his address and the cornerstone of what likely will help define the future of the U.S. military, he shared at West 2017. But getting there requires the powers that be to break paradigms that will take military forces to the next level.
Image

Contractor-Owned Systems Could Open the Door to Innovation for Government
The answer to breaking the federal information technology status quo might be adopting a different operating model.
Image

Special Ops Command Woos Nontraditional Technology Developers
Elite forces need innovators to solve hard problems.
Image

Innovation, Application Concerns Weigh Heavily on Planners
Maintaining a military technology lead is a double-edged sword that also can be blunted.
Image

DISA’s Internet Isolation Tech Aids Workers in COVID-19 Isolation
Demand for cloud-based cybersecurity may quicken the CBII program.
Image
