Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
HoneyBot Fights Cyber Crime
A Georgia Tech robot acts as a honeypot to help secure vital facilities.
Image

Cyber Technology Dives Into Innovation Showcase
It’s down to five companies as a competitive series aims to make a big splash in innovation development.
Image

How Agencies Can Defend Against Killware
A new threat emerges that needs to be addressed by the military community.
Image

Center Fortifies Cyberspace Front Line
The convergence of information technology and voice communications is prompting another merger—this one between government and industry. The establishment of the National Cybersecurity and Communications Integration Center late last year is the first step in unifying the effort to keep U.S. information networks and infrastructure secure and to respond immediately in case of attack. The center increases the U.S. government’s ability to detect, prevent, respond to and mitigate disruptions of voice and cyber communications.
Did You Read Your STIG Today?
Even if people try to practice sound information assurance, it is often difficult to keep up with some of the policies and procedures because technology moves at such a fast pace. This is true not only in military, government and private sector settings, but also in our own homes. Often network intrusions are not due to malicious or negligent actions, but to lack of understanding of what needs to be done. That’s where Security Technical Implementation Guides (STIGs) come in.
Building Trust in the Cyber Era
Panelists tackle challenges to information sharing.
Image

Chip-Bearing Credit Cards Present New Vulnerabilities
Consumers and merchants alike could face increased cyber crime.
Image

Recruit Like You Are Jeff Bezos
U.S. Army Cyber Command shares similar challenges to that of a business manager.
Image
Maneuver in the Global Commons—The Cyber Dimension
Much has been written about maneuver in various domains of conflict—land, sea and air. As in many other fields, the thinking owes much to the late Col. John Boyd, USAF, who is well known for his concept of the OODA loop (observe, orient, decide, act), and who contributed materially to thinking about maneuver warfare vice attrition warfare.
Encrypted Internet Traffic a Key Cybersecurity Threat
Malware attacks nearly doubled in 2015 to reach up to 8.19 billion.
Image
