An industry survey forecasts broad use of crypto technologies as more enterprises shift sensitive data to the cloud.
The U.S. Cyber Command is gearing up for the initial operating capacity of its Cyber Mission Force, despite some setbacks, and looking to groom the next generation of cyber warriors in the pipeline.
A new survey of DOD IT pros by SolarWinds finds that foreign governments are now seen as the greatest source of IT security threats.
In a new initiative called Hack the Pentagon, DOD is inviting vetted hackers to explore potential vulnerabilities in systems as part of the government’s first bug bounty program.
A recent exercise expands on work to take cyber tools into the battlefield.
During a recent Congressional hearing, experts provided insight on the merging tactics of countries such as Russia and Iran.
The Defense secretary, while offering few details, said DOD is looking to limit the group's command and control capabilities and overload its networks.
CERDEC'S universal encryptor, called RESCUE, can provide a solid crypto core for numerous devices, increasing capability while cutting costs