Intelligence fuels an organization’s ability to stay ahead of the next threat while enabling the business to make informed decisions. A successful threat intelligence program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. As technology evolves, threat actors will inevitably
Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage. There has been controversy over whether such operations can be called "war". Nevertheless, powers have been developing cyber capabilities and engaged in cyberwarfare, both offensively and defensively.
Holly Dragoo is a research associate with the Advanced Concepts Laboratory at the Georgia Tech Research Institute. Her previous work with the U.S. Department of Defense and Federal Bureau of Investigation give her a unique understanding of cybernetwork intrusions and intelligence analysis. Her research interests include cyberwarfare policy issues, threat
The Department of Homeland Security on Monday issued guidance to U.S. companies and government agencies on securing their computer networks following the killing last week of a top Iranian general.
A junior Marine got his artillery unit into a serious bind after snapping a photo during a massive force-on-force training exercise in California's Mojave Desert.
Security analysts from IBM recently discovered a data-wiping malware dubbed as ZeroCleare.
If "mutually assured cyber destruction" were to occur, one Marine Corps leader said, authoritarian nations such as China might have more to lose than the United States.
Defending in cyberspace is only half the battle. Making it clear to adversaries that the United States is capable of engaging in damaging cyberattacks of its own is a way of deterring adversaries from acting in the first place, a senior Defense Department official told lawmakers on Capitol Hill.
Eight of the world's biggest technology service providers were hacked by Chinese cyber spies in an elaborate and years-long invasion, Reuters found. The invasion exploited weaknesses in those companies, their customers, and the Western system of technological defense.
U.S. military cyber forces launched a strike against Iranian military computer systems on Thursday as President Donald Trump backed away from plans for a more conventional military strike in response to Iran's downing of a U.S. surveillance drone, U.S. officials said Saturday.
Within the U.S military services, leaders often discuss the close relationship of cyber warfare and electronic warfare. But what's less clear is the relationship between these two disciplines at U.S. Cyber Command.