This article is included in these additional categories:

IT - Cyber-Security | Security & Secrecy | Transformation | USA | Warfare - Trends

Pentagon Looks for Prophylactic Measures Against Trojans

For more on this and other stories, please consider purchasing a membership.
If you are already a subscriber, login to your account.
Federal Computer Week notes that “Defense and industry officials describe DOD networks as the Achilles’ heel of the powerful U.S. military. Securing military networks is even more critical in an increasingly transformed military in which information is as much a weapon as tanks and assault rifles.” The US DoD operates approximately 3.5 million PCs and […]

One Source: Hundreds of programs; Thousands of links, photos, and analyses

DII brings a complete collection of articles with original reporting and research, and expert analyses of events to your desktop – no need for multiple modules, or complex subscriptions. All supporting documents, links, & appendices accompany each article.

Benefits

  • Save time
  • Eliminate your blind spots
  • Get the big picture, quickly
  • Keep up with the important facts
  • Stay on top of your projects or your competitors

Features

  • Coverage of procurement and doctrine issues
  • Timeline of past and future program events
  • Comprehensive links to other useful resources