Identify, prioritize and remediate all your security threats with our easy-to-use SaaS platform. Monitor your environment and detect threats 24/7.
The Internet of Things (IoT) in Defense thematic intelligence report assesses how IoT, combined with other emerging technologies, can be used across the defense value chain. It provides an overview of the current landscape. The report also includes key p
The Aerospace and Defense Predictions thematic intelligence report identifies the top themes that will impact the defense sector’s growth in the coming years. For each theme, the report offers a series of predictions, identifies winners and losers, and points one to further reading. Moreover, the...
plans a constellation of 36 satellites providing hourly synthetic aperture radar coverage with one-meter resolution. At the Defense Geospatial Intelligence (DGI) conference in London, a manager from Hexagon, an American GEOINT provider, highlighted that high refresh rates could enable near-real-time ch...
Advises and assists the program in the integration of intelligence data, counterintelligence, and security requirements during defense systems engineering as part of the acquisition life- cycle. b. Oversees defense intelligence enterprise performance in meeting critical intelligence priorities for defense ...
The category and reputation-based filtering—the quicker and smarter way to filter URLs—uses Cisco's up-to-date threat intelligence information and is highly recommended. The cloud-delivered Firewall Management Center can now query for up-to-date URL ...
ArcSight Enterprise Security Manager ArcSight Intelligence ArcSight cyDNA Cybersecurity Aviator Reinvent threat hunting to improve security posture with the power of agile AI ⟶ Developer Cloud Information Management Services Developer Cloud technical documentation Information Management APIs and services API...
On Jan. 31, DoD unveiled the Defense Management Institute (DMI), a non-profit and non-partisan research organization committed to enhancing the department’s management, organization, performance improvement, and enterprise business operations.
REMOTE WORKFORCE ACTIONABLE LEARNINGS GLOSSARY Introduction JOHN LAMBERT, DISTINGUISHED ENGINEER AND GENERAL MANAGER, MICROSOFT THREAT INTELLIGENCE CENTER Nation state threats are defined as cyber threat activity that originates in a particular country with the apparent intent of furthering national interests...
On this week’s Cyber Report, Rear Adm. William Metts, USN Ret., the director for strategy and program integration at Northrop Grumman Cyber and Intelligence Mission Solutions, discusses cyber training and certification across all warfare domains with Defense & Aerospace Report Editor Vago Muradian....