Exclusive Content

The Big Cyber Spend and its Mission Force

The Big Cyber Spend and its Mission Force

This exclusive infographic dives deeper into the Cyber Force Team’s missions and how the DOD has stepped up its cyber security game. It also includes,

  • A breakdown of the FY2017 budget for cyber operations and what it supports
  • The DOD’s three primary cyber missions The five major end-goals for the military Strategies to incorporate new technologies across the cyber spectrum
  • How to develop and integrate new cyber strategies
Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Looking to tap cyber talent in the private sector, the U.S. Navy has been holding a series of hackathons. The challenge: Find a way to crack the security systems of military drones and warships. Courtesy of FastCompany.com
Global Cyber Weapons Technologies Market Forecast to 2026

Global Cyber Weapons Technologies Market Forecast to 2026

This new sample report examines, analyzes and predicts the evolution of technologies, markets and outlays (expenditures) for offensive and defensive Cyber Weapons until 2026, starting from 2016. The report also examines each of these markets geographically, focusing on the top 95% of global markets (United States, Europe and Asia).
WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks announced that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The huge trove of data, called “Vault 7,” exposed the hacking capabilities of the US Intelligence Agency and its internal infrastructure.
7 Outlets of FY17 DHS Cyber Funding

7 Outlets of FY17 DHS Cyber Funding

This FY17 budget accelerates the Continuous Diagnostics and Mitigation initiative to protect federal networks from cyber-attack. Resources are also allocated internally across all DHS Components that own information technology systems as part of a plan to fix known information technology system vulnerabilities.
Digital Transformation is the first line of Defence

Digital Transformation is the first line of Defence

In today’s digital age, governments, businesses and citizens are all seeking to create new opportunities and efficiencies through the use of digital technologies. For defence agencies, the secure, fluid and timely flow of data and intelligence is the life-blood of modern military activity.
FBI and CIA Viewpoints on Current and Future Cyber Threats

FBI and CIA Viewpoints on Current and Future Cyber Threats

We recently spoke with FBI Section Chief, Trent Teyema, who oversees all aspects of operation readiness for the FBI’s Cyber Division, and most recently served as the Special Agent in Charge of Counterintelligence and Cyber for the Los Angeles Field Office. As well as Sherrill L. Nicely started her tenure as CIA’s Chief Information Security Officer. She is responsible for overseeing the defensive posture of the Agency's cyber security capabilities.