The Cyber Defense Review


1 2 3 4 5 6 7 8 9 10 ... 20

The Cyber Defense Review: Defending Forward

November 15, 2019 —  Welcome to the Fall edition of The Cyber Defense Review (CDR). This tenth edition of the CDR is published in conjunction with the Army CyberInstitute’s (ACI) International Conference on Cyber Conflict U.S.(CyCon U.S.), which takes place November 18-20, at the Crystal Gateway Marriott in Arlington, VA. The CyCon U.S. conference is the premier forum MORE

A Conversation with General (Ret.) David H. Petraeus

November 15, 2019 — Cyber operations are a perfect example of how efforts in one domain can affect virtually every aspect of a nations comprehensive security. The CDR was keenly interested in General David Petraeus’ view of comprehensive security, its whole-of-government implications, and its critical importance to the United States. The interview was conducted via MORE

A Case for Action: Changing the Focus of National Cyber Defense

November 15, 2019 — The United States government has made major strides in the past year in improving our nation’s cyber defense with initiatives such as the creation of the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the new DoD Defend Forward policies. However, our nation’s emphasis re­mains focused on improving MORE

Information Warfare and Its 18th and 19th Century Roots

November 15, 2019 —  For Joint Force leaders to visualize and describe how the operational environment shapes the range of military operations, they must have a deep understanding of the capabilities comprising the multi-domain battlefield. The information environ­ment, which Joint Publication (JP) 3-13 defines as the “aggregate of individuals, organizations, and MORE

Data Privacy and Protection: What Businesses Should Do

November 15, 2019 — Data privacy and protection should be priorities for every business, large or small, regardless of sector or geographic location. Data collection is now a critical com­ponent of all business operations, whether it is client data to perform a simple service or enterprise data to ensure operations of critical infrastructure. In to­day’s operating MORE

Thinking Like a State Cyber Threat Actor

November 15, 2019 — Information security and intelligence professionals have long known the value of thinking like their adversary. If the defender can put themselves into the mind of their adversary, they can predict behaviors, anticipate attacks, and make moves and counter-moves that frustrate their enemy at a level far beyond what a traditional reactive defense can MORE

The Untold Story of Edward Snowden’s Impact on the GDPR

November 15, 2019 — In June 2013, National Security Agency contractor Edward Snowden released a trove of information on classified U.S. Government surveillance methods. U.S. Intelligence chiefs warned that the ripple effects of the leak would be devastating and extensive. Five years later, in June 2018, Joel Melstad, a spokesman for the U.S. National MORE

The Friction Points, Operational Goals, and Research Opportunities of Electronic Warfare and Cyber Convergence

November 15, 2019 — With Electronic Warfare joining the Cyber Branch in October 2018, numerous opportunities and challenges that affect warfighters are surfacing. To capture and consolidate some of these observations, the Electronic Warfare Cyber Convergence (EWC2) workshop, held in conjunction with the 2018 Cyberspace Electromagnetic Activities (CEMA) conference, MORE

Artificial Intelligence in Digital Warfare: Introducing the Concept of the Cyberteammate

November 15, 2019 — Technology changes our world at such a rapid pace that our natural, human intelligence has a hard time coping with its brutally disruptive evolution. The transformations of digital technologies have made deep and lasting impacts on our societies. Information, which is at the heart of the last century’s technological developments, has become such an MORE

The Post-GIG Era: From Network Security to Mission Assurance

November 15, 2019 — The shortcomings of the Global Information Grid (GIG) may be traced to a discon­nect between cyber policy and technology, and an illusion that cyber defense contributes somehow to mission assurance. Therefore, it is necessary to look past the GIG to a future of affordable access and mission assurance. Prescriptive cyber policies have impeded the MORE

1 2 3 4 5 6 7 8 9 10 ... 20