Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3723 Results
5 Tips for Creating a Cybersecurity Culture Within DOD Environments
The recommendations are offered as the government observes Cyber Awareness Month.
Image

Israel’s Four Factors for Successful Cyber Recruitment
As recruitment dwindles in many democracies, the Jewish state found a boon to attract increasing numbers into service. It has successfully created units where training combines skills necessary for national security as well as qualifications for high-end jobs when draftees return to civilian life.
Image

The Problems With Hacking Back
Combating cyber criminals the smart way.
Image

HoneyBot Fights Cyber Crime
A Georgia Tech robot acts as a honeypot to help secure vital facilities.
Image

Cyber Technology Dives Into Innovation Showcase
It’s down to five companies as a competitive series aims to make a big splash in innovation development.
Image

How Agencies Can Defend Against Killware
A new threat emerges that needs to be addressed by the military community.
Image

Center Fortifies Cyberspace Front Line
The convergence of information technology and voice communications is prompting another merger—this one between government and industry. The establishment of the National Cybersecurity and Communications Integration Center late last year is the first step in unifying the effort to keep U.S. information networks and infrastructure secure and to respond immediately in case of attack. The center increases the U.S. government’s ability to detect, prevent, respond to and mitigate disruptions of voice and cyber communications.
Did You Read Your STIG Today?
Even if people try to practice sound information assurance, it is often difficult to keep up with some of the policies and procedures because technology moves at such a fast pace. This is true not only in military, government and private sector settings, but also in our own homes. Often network intrusions are not due to malicious or negligent actions, but to lack of understanding of what needs to be done. That’s where Security Technical Implementation Guides (STIGs) come in.
Building Trust in the Cyber Era
Panelists tackle challenges to information sharing.
Image

Chip-Bearing Credit Cards Present New Vulnerabilities
Consumers and merchants alike could face increased cyber crime.
Image
