Counter-AI Offensive Tools and Techniques
What is the state of industry investment in and development of products in support of counter-artificial intelligence offensive tools and techniques?
Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
What is the state of industry investment in and development of products in support of counter-artificial intelligence offensive tools and techniques?
What information is available on secure identity and access management solutions?
How does the DoD use Apple computers on their networks?
FORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the Army’s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding General…
How can we glean useful insights from databases containing confidential information while protecting the privacy of the individuals whose data is contained within? Differential privacy, a way of defining privacy in a mathematically rigorous manner,…
WASHINGTON – The U.S. Army has released its Army Unified Network Plan (AUNP) 2.0. While the first AUNP, published in 2021, focused mainly on the first phase of the plan – to unifying the network…
The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…
In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…
Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…
The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military,…