Recently, challenges to the security of cyber control systems that operate the nation’s civilian critical electric power infrastructure have been brought to light by the government and media alike.
The USAF’s CROCS division for operational technology wants to improve its workforce to better fight advanced persistent cyber ...
Operational technology (OT) is a prime cyber target in federal environments because it underpins essential services and mission-critical operations. According to Forescout Research – Vedere Labs, ...
Erica D. Borghard and Shawn W. Lonergan are research fellows at the Army Cyber Institute at West Point. You can follow them @eborghard and @Shawn_Lonergan. During the Cold War, when nuclear-armed ...
The outbreak of war in Ukraine in February 2022 marked the dawning of a long-predicted era in which cyber space became as much a theatre for warfare as the kinetic battlefield, but a little over two ...
IEEE is a participating organization for the May 5–7 Sensors Converge conference, where I will be speaking on the critical ...
The Air Force this year has reorganized its business and acquisition operations to become more cost-effective and take better advantage of commercially available technologies. The restructuring of ...
Cyber incidents threaten an organization's data management and retention capabilities, business operations, and client relationships. Even organizations with sophisticated security systems can be at ...
CIOs, CTOs, and CISOs today can find themselves constantly on the defensive, having to adjust their security protocols and tooling to match the latest shift in the technology landscape. This may be ...
A C2 or C&C attack includes the set of tools and techniques that hackers use to communicate with the compromised devices in order to give the instructions to spread the infection. In a Command and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results