:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GMWEPZQTNFDXPF65EE32QL3N7Q.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GMWEPZQTNFDXPF65EE32QL3N7Q.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XPKKW5B7JVBTFKKI7QFAMDZTSQ.jpg)
US government surveillance tool should face limits, privacy panel says
Many Democratic and Republican lawmakers say they won’t vote to renew Section 702 when it expires at the end of the year without major changes.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SZN6B2QQLJB2BPNUWP4AGY2AXM.jpg)
Opinion
How automated tagging helps mission teams securely share information
Data-centric security safeguards information regardless of where it’s located or who it’s shared with, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3DQ225KJBJGGLI7XK5BYBZ3GKE.jpg)
Opinion
In the pipeline: The impact of TSA cybersecurity directives
Continuous monitoring provides real-time visibility into anomalous activities, unauthorized access attempts and potential threats, the author argues.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VKFRD4Q64FC6BFA3WKY2KZUZCA.jpg)
Cybersecurity and Infrastructure Security Agency curbs telework
Remote workers outside of the national capital region are not affected by the decision.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
Cyber attacks reveal uncomfortable truths about US defenses
It should be recognized that cybersecurity systems can be just as flawed as the systems they protect, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3T6LCSAGJFAJ5ISIYQZSMIWBC4.jpg)
Opinion
How to optimize Internet of Things security while promoting innovation
The Federal Communications Commission is seeking public comments on the proposed cybersecurity labeling program.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TLZL7RIVWJD4LBQHXTXALWH6KQ.jpg)
Allies first: The future of military data sharing?
The Ukraine war has reaffirmed the vital importance of enabling militaries to communicate faster, more efficiently and safely with each other.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/35CAA3IBNFAILJZ3XUEQ6W2ODM.jpg)
Estonian firm develops virtual ‘shooting range’ to test cyber defenses
CybExer Technologies works with Estonian Defence Forces, as well as the armed forces of a number of European countries including Ukraine.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6DNFYPMNLFGDPNIJRYJ5DZGH74.jpg)
Babcock, Palantir bank on data crunching to boost UK force readiness
The British defense contractor is smitten with the possibilities of Palantir's Foundry data analytics system.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HCGDLS7P4ZGLJATOTN3QOQGZ5E.jpg)
Australian, UK and US tech companies already reaping AUKUS benefits
Australian, UK and US companies may see greater collaboration under AUKUS. But they're not waiting on official details - many are working together already.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DJN2IS4DNFAVFPNPRVYU6CQECY.png)
PowerPoint creator, unwitting pioneer of military lethality, dies
Dennis Austin had no way of knowing that his creation would be hijacked by head-exploding graphics-loving DoD personnel.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
How to protect critical infrastructure and ensure mission readiness
Organizations – especially critical infrastructure organizations – are under siege in cyberspace daily.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/QSWZ6WOU7BBURLWBQMUSSA4M2E.jpg)
China, Russia will use cyber to sow chaos if war starts, Pentagon says
The strategy describes China as a “broad and pervasive” cyber espionage threat and Russia as a malign online influence.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/V5MFPJAXLNDO7BV3UQATIP6AWE.jpg)
IAI lauds intel suite to predict surprise attacks as seen in Ukraine
The company's Starlight application looks for anomalies in everything from social media feeds to troop movement reports.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Opinion
What new federal cybersecurity policy means for government contractors
The most controversial section calls for holding software companies liable for producing insecure code.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4SV2XPCXPRDF7DV4ZXPWATWOZY.jpg)
Pentagon to review zero-trust blueprints across military services
“We’ve got to flip the script here, given what we face here in 2023 and beyond,” Pentagon CIO John Sherman said at a cybersecurity conference.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/RODAUIDBMJDU3NXACZRZRUUHVM.jpg)
White House Situation Room gets cutting-edge tech in $50M upgrade
This is where history happens, where the president meets with national security officials to discuss secret operations and sensitive government matters.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/447SUEJ4IREKBFIEARU3PCYLKE.jpg)