Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3714 Results
Congress Raises Privacy and Civil Liberty Concerns with the DHS’ Use of Biometrics
The federal government's use of facial recognition and other technologies must be scrutinized, some lawmakers assert.
Image

Building the Pacific Future
When U.S. Pacific Command personnel move into their new headquarters building early next year, they will be doing more than just shifting operations to a different location. Featuring an architectural style that is harmonious with the surrounding Hawaiian landscape, the Nimitz-MacArthur Pacific Command Center will be filled with cutting-edge technology that will project the staff's virtual presence across the Asia-Pacific theater. It has been designed to support Joint Vision 2010 operational concepts.
Prototype Improves Command and Control of Intelligence Data
The U.S. Air Force soon will begin installing a new system to aid intelligence, surveillance and reconnaissance planning and tasking.
Multidomain Operations May Hinge on IoT Capabilities
New concepts brought by the Internet of Things are changing Army approaches.
Image

Information Technology Design for the Intelligence Analyst
Human-centered design principles should guide information presentation.
Image

Challenges to Crewing the Future Fleet
The U.S. Navy will need to train a different type of sailor for its new ships and operations.
Image

Tackle the Crisis Before the Catastrophe
Senior national security advisers call for a novel approach to the National Defense Strategy.
Image

CISA Issues Binding Directive To Combat Internet-Related Risks
Federal agencies must implement zero-trust measures or immediately remove specific interfaces.
Image

Fair Elections Depend on Information Assurance
Security standards would protect citizens’ rights and freedoms.
Image

Transportation Security Tackles Network Security
The Transportation Security Administration is doing more than just making sure travelers have a safe trip; it also is ensuring the security of the data, video and voice communications that travel on its network. In response to the deficiencies raised in a report issued by the U.S. Department of Homeland Security's inspector general last year, the administration acknowledged its network flaws and moved forward quickly to correct them. Among the issues that needed to be addressed were policies, processes and procedures concerning security testing, audits, and configuration and patch management.