Friday, August 14, 05:07
Home security The U.S. military is taking new steps to stop hackers

The U.S. military is taking new steps to stop hackers

The US military is also working to take advantage of cloud migration and at the same time ensure data security from hackers.

Cloud migration, which is spreading across the service at lightning speed, of course brings a number of unprecedented advantages, such as more ubiquitous data access, wider information sharing and what could be called almost immediate ability to download data needed to quickly make some battle-sensitive decisions. The advantage of the cloud is often described as "concentrated" information with "decentralized" networking, execution and transmission information.

army of hackers

"Ammunition is sensors, airplanes are sensors. I just see a plethora of sensors. Everything ends up in the data. When it comes to the cloud, there's going to be some space to transfer that data, "said General John Murray.

Murray and his counterpart Bruce Jette are working to speed up cloud migration, while also offsetting additional risks. security possibly introduced by the procedure. In addition to the massive acceleration of critical warfare networking, the cloud may also present vulnerabilities due to the extensive access of potential hackers in case they are able to violate a single entry point. Part of the answer or approach to this challenge, which aims to maximize the benefits of the cloud while reducing the risk of hackers, is to implement a transfer organization. data and scaling.

"If you're thinking about what the cloud is, it's a hard disk server that can run programs remotely or transfer data through a network. I don't always want to download all the data, but only the most suitable ones information Jette told The National Interest in an interview.

Also, as part of this full equation, there are cases where the use of the cloud may have additional security benefits through updates. software and increased virtualization. Going beyond a more unique focus on perimeter security or the hardware, the initiatives in cyber security can have a wide range in the cloud through virtualized improvements. In essence, the upgrades software can affect an entire network in relation to a more limited application.

Jette, who oversees between 600 and 800 acquisition programs, spoke of the long-term effort to change systems so that they are more resistant to cyber threats.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


The 20 best gaming consoles of all time

On the threshold of the new generation of consoles, such as the PlayStation 5 and the Xbox Series X, these are the most important and ...

Smart locks: Every home needs to have one!

Home security is a complex issue, but anything is safer than hiding a spare key in a very ...

LinkedIn: How do you record and display the pronunciation of your name?

Having a last name that almost no one pronounces correctly can sometimes be annoying. Thus, LinkedIn attempts ...

Cyber ​​attacks: 5 steps to deal with security incidents

Every organization is prone to cyber attacks and, when it happens, there is a small line between rescuing your network security and ...

Protect your personal data while on vacation

Have you had the chance to go on vacation and lose your passport, your wallet or other ...

How to get Snapchat on your computer

One of the most popular applications in recent years, Snapchat, has given many hours of fun and communication to its users. But did you know ...

Windows applications you need to delete for a better experience!

Some Windows applications are necessary for a computer to function properly, while others often cause problems. These are applications that ...

How to test the new data-saving video settings of Chrome 86?

If there's one issue with the upcoming Chrome 86 update, it seems to be efficiency. Users expect a ...

Netflix: How to change the language in profiles, subtitles and audio

Netflix is ​​not just an English-language streaming service with content from around the world. You can easily watch movies and ...

How to block spam calls and messages on Android?

Android can help you block and get rid of annoying spam calls. If you block ...