Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Cyber Intrusions Linked to Global Geopolitics
It took 18 years of responding to breaches before FireEye CEO Kevin Mandia made the connection, the former Air Force computer security officer revealed at a recent conference.
Image

Take Me to Your Cyber Leader
The threat to cyberspace now rivals that of terrorism and weapons of mass destruction. That is the message in the latest effort to rouse the public from slumber induced by ignorance, indifference, apathy, confusion and denial. Government is inundated with reports and studies from think tanks, academia, prestigious government research agencies and the cybersecurity industry—each decrying the weak and deteriorating state in our cyberdefenses and proffering advice to the new administration.
From the Desk of AFCEA’s Cyber Committee
Making the Case for a National Bureau of Cyber Statistics
Image

Obama Launches National Cybersecurity Action Plan, Calls for $19 Billion
FY17 budget request marks an increase of 35 percent and the creation of 2 councils for cyber.
Image

Intel Community to Tackle State of Cybersecurity at Fall Summit
Cyber breaks into the world of intelligence as calamitous breaches distress nation.
Image

Machine Learning Advances Can Strengthen Cyber Defense
Out-of-the box thinking is needed when using machine learning to help secure systems, an expert says
Image

U.S. Army Developing Mighty Morphing Network
The U.S. Army's Communications-Electronics Research, Development and Engineering Center (CERDEC) is building a prototype network capable of morphing over time to confuse cyber intruders and thwart attacks on military networks. The Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR) prototype is scheduled to be available in the 2014 fiscal year and will be capable of pulling a cyber bait-and-switch on unsuspecting network intruders.
Modernizing Cyber Defense for the U.S. Navy
Navy commands change how they operate, secure and defend data.
Image

Network-Centric Systems Need Standards and Metrics
Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.
Facing the Valley of Death Amidst Russian Cyber Threats
European nations bordering Russia face costly challenges in building cyber-resiliency, with Finland and Estonia leading the way.
Image
