Home / Cyber (page 11)

Cyber

New Physical and behavioral Biometrics technologies with increased accuracy and security being developed

Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from consumers in 2021, a nearly 27% increase over the 2.2 …

Read More »

Rising DNS attacks require DNS security measures and Protective DNS says Joint NSA and CISA Guidance

The Domain Name System (DNS) is central to the operation of modern networks, translating human-readable domain names into machine-usable Internet Protocol (IP) addresses. Email services, chat services and even social networks rely on DNS to work 24 hours a day, 7 days a week resolving IP addresses into hostnames. DNS …

Read More »

Artificial Intelligence and Machine Learning are enabling the future of fully automated Cyber Security

AI emulates human cognition – i.e. learning based on experience and patterns, rather than by inference (cause and effect). Artificial intelligence covers everything from machine learning to business intelligence. Machine learning is a branch of artificial intelligence (AI) that refers to technologies that enable computers to learn and adapt through …

Read More »

DOD adopt an initial zero-trust architecture, Trust must be continually assessed and granted in a granular fashion.

The Defense Department has been pushing hard for digital modernization, but the massive hacking campaign that breached multiple federal government agencies via Solarwinds software has put some of its more nascent efforts at risk — namely software factories. “Yes, this creates a new kind of target for our adversaries. These digital …

Read More »

USAF Agile Cyber Technology 3 (ACT 3) to develop enabling technologies to achieve cyber superiority.

Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested and/or denied. Yet our ability to address opportunities and threats …

Read More »

DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments

The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of …

Read More »

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or online transactions would not be possible without it.   Quantum …

Read More »

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most significantly, through the use of commercial mobile solutions to provide …

Read More »

Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects

Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its transmitter toward a mirror placed inside of it. The vibrations …

Read More »

DARPA’s AMP to develop rapid, assuredly safe, and scalable software patches for reducing vulnerabilities of mission-critical systems

Our society’s infrastructure is increasingly dependent on software deployed on a wide variety of computing devices other than commodity personal computers, such as industrial equipment, automobiles, and airplanes. Unlike commodity computers that have short upgrade cycles and are easily replaceable in case of failure, these computing devices are intended for …

Read More »
error: Content is protected !!