U.S. Secretary of Defense Ash Carter will renew his appeal to businesses to work more closely with the military on Thursday when he speaks to an audience of top executives at the Sun Valley conference in Idaho.
The 6-foot, 2-in. tall humanoid robot that many teams in the finals of the DARPA Robotics Challenge will be using in June has gotten a major makeover. And the teams using it in the finals got their first look just last week.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
To make more efficient use of data and improve data protection, take a holistic approach to information governance-one that focuses attention on the most sensitive data while removing impediments to sharing.