Information Security


An airman goes through flight procedures during Red Flag 16-1.

Endgame cyber solution proves useful for Air Force at Red Flag

The commercial tool has been effective in hunting and securing networks during the Air Force’s two most recent large-scale exercises.

The 4 prongs of DOD's cybersecurity discipline plan

The Pentagon's implementation plan looks to enforce better cyber hygiene throughout the department.

Cloud shift, data security driving encryption use

An industry survey forecasts broad use of crypto technologies as more enterprises shift sensitive data to the cloud.

DOD's long path to creating a cyber warrior workforce

The U.S. Cyber Command is gearing up for the initial operating capacity of its Cyber Mission Force, despite some setbacks, and looking to groom the next generation of cyber warriors in the pipeline.

Survey: Nation-states overtake insiders as DOD's top cyber threats

A new survey of DOD IT pros by SolarWinds finds that foreign governments are now seen as the greatest source of IT security threats.

Pentagon to welcome hackers with open arms

In a new initiative called Hack the Pentagon, DOD is inviting vetted hackers to explore potential vulnerabilities in systems as part of the government’s first bug bounty program.

Army giving cyber capabilities to tactical units

A recent exercise expands on work to take cyber tools into the battlefield.

Experts: Cyber adversaries becoming more brazen

During a recent Congressional hearing, experts provided insight on the merging tactics of countries such as Russia and Iran.

Defense Systems Update

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.