Tuesday, January 26, 03:11
Home security The U.S. military is taking new steps to stop hackers

The U.S. military is taking new steps to stop hackers

The US military is also working to take advantage of cloud migration and at the same time ensure data security from hackers.

Cloud migration, which is spreading across the service at lightning speed, of course brings a number of unprecedented advantages, such as more ubiquitous data access, wider information sharing and what could be called almost immediate ability to download data needed to quickly make some battle-sensitive decisions. The advantage of the cloud is often described as "concentrated" information with "decentralized" networking, execution and transmission information.

"Ammunition is sensors, airplanes are sensors. I just see a plethora of sensors. Everything ends up in the data. When it comes to the cloud, there's going to be some space to transfer that data, "said General John Murray.

Murray and his counterpart Bruce Jette are working to speed up cloud migration, while also offsetting additional risks. security possibly introduced by the procedure. In addition to the massive acceleration of critical warfare networking, the cloud may also present vulnerabilities due to the extensive access of potential hackers in case they are able to violate a single entry point. Part of the answer or approach to this challenge, which aims to maximize the benefits of the cloud while reducing the risk of hackers, is to implement a transfer organization. data and scaling.

"If you're thinking about what the cloud is, it's a hard disk server that can run programs remotely or transfer data through a network. I don't always want to download all the data, but only the most suitable ones information Jette told The National Interest in an interview.

Also, as part of this full equation, there are cases where the use of the cloud may have additional security benefits through updates. software and increased virtualization. Going beyond a more unique focus on perimeter security or the hardware, the initiatives in cyber security can have a wide range in the cloud through virtualized improvements. In essence, the upgrades software can affect an entire network in relation to a more limited application.

Jette, who oversees between 600 and 800 acquisition programs, spoke of the long-term effort to change systems so that they are more resistant to cyber threats.


Please enter your comment!
Please enter your name here

Teo Ehchttps://www.secnews.gr
Be the limited edition.



COVID-19 vaccines: Ways to protect supply chains

The development of vaccines for COVID-19 in such a short period of time has created many challenges and these are not only related to ...

How do insurance companies "enhance" ransomware attacks?

Ransomware attacks have increased significantly, with experts warning that their victims should not pay ransom to hackers ....

Russia: "US may be planning retaliation for SolarWinds hack"!

The Russian government warns the country's organizations about possible cyber attacks that the US may carry out, as "retaliation" for the hack ...

iPhone: How to see which apps have access to your contacts

Some iPhone privacy issues go deeper than accessing your contacts list, which exposes your contacts to ...

COVID-19: Google makes vaccination clinics available

Google CEO Sundar Pichai said Monday that the company will make its facilities available to become clinics ...

Netflix offers "studio quality" audio upgrade on Android

Do not be surprised if Netflix sounds better the next time you run a marathon with rows on your Android phone ...

Will Bitcoin return to $ 40.000? There is concern!

Bitcoin lovers who take his return above the level of $ 40.000 for granted have been worried because the demand ...

Avaddon ransomware: Its operators threaten with DDoS attacks to get ransom!

Lately, more and more ransomware gangs tend to threaten their targets with DDoS attacks in order to secure profits ....

Volunteer firefighters will be trained through VR simulation

Volunteer firefighters in the Australian state of Victoria will soon have access to the virtual reality (VR) training that will be available in ...

Tesla: Accuses its former employee of stealing her confidential data!

On January 23, Tesla sued former employee Alex Khatilov for stealing 26.000 confidential documents, including trade secrets. The software ...