Search Results for "" small business ""
Not finding what you’re looking for?
10 of 1630 Results
The Expected Transformation of Signaleers
The traditional support role of comms soldiers will merge more into an operational role, leader says.
Image
Technology Did Not Create and Cannot Resolve Privacy Dilemma
The exploding use of encryption in cyberspace has spawned a dilemma for policy makers. They must strive to balance citizens' rights to security and privacy with the needs of law enforcement and intelligence to police what a senior defense official terms a "lawless frontier," and others call the "World Wild Web."
Smart Software Sniffs Out Trouble
A security management system allows administrators to track computer network threats by providing near-real-time alerts from remote sensors on the network. Software agents, tailored to be expert monitors of specific programs and devices, use rules sets to sift through data before sending reports to a central management engine that tracks and correlates the information. Thousands of potential alerts then are analyzed and reduced to one or two dozen incidents that require immediate attention.
Game-Changing Environment Vexes Planners, Warfighters
The dynamic environment that defines trends from social development to technology innovation is wreaking havoc on attempts to plan an effective national security structure. Coupled with severe budget limitations arising from the global economic crisis, this rapidly changing milieu is revolutionizing warfighting in ways that cannot be countered—or even predicted—on short notice.
Advancing on the Virtual Frontier
Reaching beyond the traditional domains of sea, land, air, space and cyberspace, the U.S. military now is exploring its newest realm: the virtual world. The services are creeping cautiously into the latest frontier of simulated worlds with islands and avatars. This is not a simple maneuver. It is one filled with hurdles and pitfalls, but it is a domain that the U.S. Defense Department understands it can ignore no longer.
Sweden's Military Looks Outward
Long-neutral Sweden faces major defense changes as it shifts its military emphasis from homeland defense to coalition operations. A force built around defending the territory of a single Scandinavian nation now must open up to interoperate fully with other nations in distant locales. This is bringing about changes in funding, logistics and force size.
News Briefs
Government Begins Quadrennial Review
Security Product Trust Demands Laboratory Test and Evaluation
Uncertainty surrounding a patchwork of commercial information security products hurriedly placed in use on U.S. Defense Department computers and networks is reshaping policy. Successful test and evaluation of these products in specified laboratories will soon become a prerequisite for procurement by military services and defense agencies.
As evaluation policy emerges, the National Security Agency (NSA) is embarking separately on a major long-term program to modernize the inventory of high-grade cryptographic devices. The new cryptography will exploit technology to keep pace with modern communications as bandwidth applications change.
Meeting Software Shields Data
U.S. government agencies are using a secure electronic conferencing tool