Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3723 Results
Recruit Like You Are Jeff Bezos
U.S. Army Cyber Command shares similar challenges to that of a business manager.
Image
Maneuver in the Global Commons—The Cyber Dimension
Much has been written about maneuver in various domains of conflict—land, sea and air. As in many other fields, the thinking owes much to the late Col. John Boyd, USAF, who is well known for his concept of the OODA loop (observe, orient, decide, act), and who contributed materially to thinking about maneuver warfare vice attrition warfare.
Encrypted Internet Traffic a Key Cybersecurity Threat
Malware attacks nearly doubled in 2015 to reach up to 8.19 billion.
Image

Characteristics of a Cyber Marauder
Traits of digital bad actors reveal clues as to their operations.
Image

Creating a Common Language Of Cybersecurity
Standardized terms can produce a comprehensive threat picture.
Image

16th Air Force Positions Itself for Next-Generation Information Warfare With New Commander
The next step for the cyber component: elevating to the service-level.
Image

Partnerships Are Key To Facing China’s Onslaught Against U.S. Defense Industrial Base
The U.S. defense industrial base must improve its cybersecurity, advises the commander of U.S. Cyber Command.
Image
STUXNET: AN IMPORTANT CHANGE IN THE NATIONAL SECURITY LANDSCAPE
There are some important strategic changes occurring in the national security landscape.
A new kind of cyber attack has been noted, one that involves use of malicious code to attack infrastructure. There are some important points in this attack that should be understood by national security decision-makers.
With the launch of the code the security community calls Stuxnet, an attack was made against a programmable logic controller (PLC) that runs a physical system. This is a new degree of bad in cyber attacks.
This code is potentially (probably?) nation -state sponsored. We might never know which country, but a review of the geo-political situation today can lead to some informed speculation.
Experts Highlight Continued Software Vulnerabilities
National security and cyber experts see a huge problem with chronic cyber issues for widely used programs.
Image

NATO Set to Strengthen Cybersecurity
NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.