Step one for the Defense Department in the wake of the WikiLeaks disclosures, which saw sensitive defense intelligence splashed across newspapers worldwide, was a top-down review of the security chain and an
MoreFor years, the concept of cybersecurity centered on protecting computer networks from malicious outsiders bent on sneaking past or breaking through firewalls and gaining access to sensitive systems. But recent events in
More