The Army is experimenting with automated tools that protect artificial intelligence capabilities and reduce the number of technical personnel needed on the battlefield.
This year National Guard units will be on the keyboards and, in some areas, at the polls.
A zero-trust security infrastructure must employ machine learning to maintain better oversight of today’s complicated network perimeter.
Researchers at Carnegie Mellon University have developed a science-based policy for creating passwords that balances between security and usability.
Microsoft found that it could see when a single password was being used against hundreds of thousands of usernames.
Companies like Twitter, Facebook and Google must do more to rein in disinformation, digital repression and voter suppression on their platforms.
As with most cybersecurity problems, the ransomware threat can be minimized by implementing common-sense best practices – many of which have been recommended for decades but often are not followed.
The Defense Advanced Research Projects Agency is looking for unconventional approaches that challenge conventional wisdom and have the potential to radically change established practices.
Threat actors are looking for ways to disrupt the election with tactics such as stealing sensitive information, modifying votes after they have been cast to sway the outcome and spreading misinformation.
The Defense Department’s Commercial Virtual Remote environment will need to go to a cloud security Impact Level 5 to support higher sensitivity, controlled unclassified information and mission critical information.