Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3722 Results
Modernizing Cyber Defense for the U.S. Navy
Navy commands change how they operate, secure and defend data.
Image

Network-Centric Systems Need Standards and Metrics
Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.
Facing the Valley of Death Amidst Russian Cyber Threats
European nations bordering Russia face costly challenges in building cyber-resiliency, with Finland and Estonia leading the way.
Image

Making Innovation Relevant for Operational Success
Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.
Image

The Critical Moment of Awareness
October is Cyber Awareness Month. This is an excellent effort to spread the word about cyber safety and reinforce the policies, procedures and best business practices that support sound information assurance (IA).
CIA Spies and Influencers Take On Cyber
Deputy Director David Cohen speaks on the agency’s use of cyber intelligence to mitigate adversarial threats, as well as its social media efforts to target Russia’s good guys.
Image

Addressing Cyber Vulnerabilities
When a U.S. federal jury convicted Noshir Gowadia of spying for the People's Republic of China in August, it marked a victory for several U.S. investigative agencies. But the verdict might never have arrived without three years of assistance from another organization-the Defense Cyber Crime Center (DC3). Comprising five different entities, the military center has a special focus on computer forensics to assist its various customers and clients.
The Cyber Edge Writing Award Welcomes Submissions for 2025 Contest
Industry experts are looking for fresh and innovative solutions to critical infrastructure threats.
Image

Future Defense Department Cybersecurity Builds on the Past
Cybersecurity is becoming a critical issue for both government and industry—and for good reason. A dangerous combination of cyber-related activity is growing daily around us. This includes dependence on technology, skyrocketing cyber crime and terrorism, and vulnerabilities hidden by the complexities of an interconnected, global network. In government, industry and our personal lives, we have growing cyber dependence because that is how we are able to better perform missions, conduct business operations and lead our daily lives.
Nontechnical Professionals Follow Path to Cybersecurity Work
An immersive reskilling academy demonstrates exceptional promise.
Image
