These upgrades will play a central role in the way American and allied forces fight, and are destined to keep them at the vanguard for a long time.
By GENERAL ATOMICS AERONAUTICAL SYSTEMS, INC.Digital Bloodhound will develop tools such as the Manticore software suite that identifies cyber vulnerabilities, and the Kraken software that throws up real-time defenses against ongoing attacks.
By Theresa HitchensLos-Angeles cybersecurity company sets its sights on rapidly expanding across the Sahel G5 region with AI-powered solutions for defense
By Resecurity“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said.
By Brad D. Williams“We don’t have a parochial view, thinking that because [a cyber incident] happened over there [in that industry], it can’t happen here [in the space industry],” AIAA’s Lee says.
By Brad D. Williams“It’s the presence of this insecure gear in our networks that’s the threat, not the source of funding used to purchase it,” Commissioner Carr said.
By Brad D. WilliamsOnly after months of investigation by nearly 100 highly skilled digital forensics experts did FireEye discover the malicious “implant” in the most unlikely place. We break it all down in plain language.
By Brad D. WilliamsThe Space-ISAC will help space companies understand and comply with DoD’s new Cyber Maturity Model Certification to qualify for contracts.
By Theresa HitchensWe’ve heard national security leaders at the highest levels say it repeatedly: we are not prepared for cyber war. Gen. Keith Alexander, director of the National Security Agency and commander of U.S. Cyber Command, made it clear when he rated America’s readiness for addressing a catastrophic cyber attack “three on a scale of ten.” Homeland…
By Wyatt Kash