What happens if hackers target an Army base?

Fifth Domain: The Department of Defense’s cyber teams have typically defended IP-based networks, but now leaders are requiring a sharper focus on other networks that power installations.

Army Cyber Command recently reorganized its list of priorities for some of its cyber protection teams. Defending industrial control systems (ICS) and supervisory control and data acquisition, known as SCADA, is one of the organization’s five priorities for defensive cyber operations.

Read article

i360Gov Newsletters

The most significant government policy, business, and technology news and analysis delivered to your inbox.

Subscribe Now