Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3754 Results
Building the Pacific Future
When U.S. Pacific Command personnel move into their new headquarters building early next year, they will be doing more than just shifting operations to a different location. Featuring an architectural style that is harmonious with the surrounding Hawaiian landscape, the Nimitz-MacArthur Pacific Command Center will be filled with cutting-edge technology that will project the staff's virtual presence across the Asia-Pacific theater. It has been designed to support Joint Vision 2010 operational concepts.
Prototype Improves Command and Control of Intelligence Data
The U.S. Air Force soon will begin installing a new system to aid intelligence, surveillance and reconnaissance planning and tasking.
Multidomain Operations May Hinge on IoT Capabilities
New concepts brought by the Internet of Things are changing Army approaches.
Image
Information Technology Design for the Intelligence Analyst
Human-centered design principles should guide information presentation.
Image
Challenges to Crewing the Future Fleet
The U.S. Navy will need to train a different type of sailor for its new ships and operations.
Image
Tackle the Crisis Before the Catastrophe
Senior national security advisers call for a novel approach to the National Defense Strategy.
Image
CISA Issues Binding Directive To Combat Internet-Related Risks
Federal agencies must implement zero-trust measures or immediately remove specific interfaces.
Image
Fair Elections Depend on Information Assurance
Security standards would protect citizens’ rights and freedoms.
Image
Transportation Security Tackles Network Security
The Transportation Security Administration is doing more than just making sure travelers have a safe trip; it also is ensuring the security of the data, video and voice communications that travel on its network. In response to the deficiencies raised in a report issued by the U.S. Department of Homeland Security's inspector general last year, the administration acknowledged its network flaws and moved forward quickly to correct them. Among the issues that needed to be addressed were policies, processes and procedures concerning security testing, audits, and configuration and patch management.
Enabling Operations With Cross-Domain Transfer and Access
Sponsored Content
Image