<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005">
  <channel>
    <title>Army Cyber Institute News</title>
    <link>https://cyber.army.mil</link>
    <description>Army Cyber Institute News RSS Feed</description>
    <language>en-us</language>
    <pubDate>Tue, 13 Dec 2016 05:00:00 GMT</pubDate>
    <lastBuildDate>Sat, 14 Mar 2026 05:59:30 GMT</lastBuildDate>
    <atom:link href="cyber.army.mil?ContentType=1&amp;Site=780&amp;Category=15440&amp;isdashboardselected=0&amp;max=20" rel="self" type="application/rss+xml" />
    <item>
      <title>How to Grow a Capable Cyber Officer</title>
      <link>https://cyber.army.mil/News/Article/1342448/how-to-grow-a-capable-cyber-officer/</link>
      <description>"Given the rising number of military cyber activities between the U.S. and its adversaries over the&lt;br/&gt; 


</description>
      <pubDate>Tue, 13 Dec 2016 05:00:00 GMT</pubDate>
      <dc:creator>AUSA</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342448/how-to-grow-a-capable-cyber-officer/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Why PPD-41 is evolutionary, not revolutionary</title>
      <link>https://cyber.army.mil/News/Article/1342403/why-ppd-41-is-evolutionary-not-revolutionary/</link>
      <description>"The Obama administration released Presidential Policy Directive 41 in July to clarify roles and&lt;br/&gt; 


</description>
      <pubDate>Mon, 24 Oct 2016 04:00:00 GMT</pubDate>
      <dc:creator>FCW</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342403/why-ppd-41-is-evolutionary-not-revolutionary/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Clinton’s encryption solution would require a ton of oversight</title>
      <link>https://cyber.army.mil/News/Article/1342423/clintons-encryption-solution-would-require-a-ton-of-oversight/</link>
      <description>"Law enforcement taking advantage of zero day exploits is preferred to an overarching encryption&lt;br/&gt; 


</description>
      <pubDate>Sun, 23 Oct 2016 04:00:00 GMT</pubDate>
      <dc:creator>Cyberscoop</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342423/clintons-encryption-solution-would-require-a-ton-of-oversight/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Warner: Procurement and personnel key for cyber</title>
      <link>https://cyber.army.mil/News/Article/1342438/warner-procurement-and-personnel-key-for-cyber/</link>
      <description>"Fixing the way the U.S. government buys technology and hires and deploys its workforce is the key&lt;br/&gt; 


</description>
      <pubDate>Sun, 23 Oct 2016 04:00:00 GMT</pubDate>
      <dc:creator>Cyberscoop</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342438/warner-procurement-and-personnel-key-for-cyber/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Army wants cyber capability everywhere</title>
      <link>https://cyber.army.mil/News/Article/1342394/army-wants-cyber-capability-everywhere/</link>
      <description>"The Army's new cyber director said the service is still struggling to make cyber, electronic&lt;br/&gt; 


</description>
      <pubDate>Tue, 13 Sep 2016 04:00:00 GMT</pubDate>
      <dc:creator>FCW</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342394/army-wants-cyber-capability-everywhere/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Strategic Broadening for Mid-Career Cyber Leaders</title>
      <link>https://cyber.army.mil/News/Article/1342497/strategic-broadening-for-mid-career-cyber-leaders/</link>
      <description>"The purpose of this paper is to highlight the need for strategic broadening and policy education&lt;br/&gt; 


</description>
      <pubDate>Tue, 13 Sep 2016 04:00:00 GMT</pubDate>
      <dc:creator>Small Wars Journal</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342497/strategic-broadening-for-mid-career-cyber-leaders/</guid>
      <category>Military PME Journals</category>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>We Took West Point Cadets to (Cyber) War</title>
      <link>https://cyber.army.mil/News/Article/1342468/we-took-west-point-cadets-to-cyber-war/</link>
      <description>"Several months ago, we — members of the Army Cyber Institute and Defense Innovation Unit&lt;br/&gt; 


</description>
      <pubDate>Tue, 21 Jun 2016 04:00:00 GMT</pubDate>
      <dc:creator>War on the Rocks</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342468/we-took-west-point-cadets-to-cyber-war/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>West Point Cadets Are Shooting Down Drones With Cyber Rifles</title>
      <link>https://cyber.army.mil/News/Article/1342360/west-point-cadets-are-shooting-down-drones-with-cyber-rifles/</link>
      <description>&lt;div class="embed-responsive embed-responsive-16by9"&gt;&lt;iframe class="embed-responsive-item" src="//www.dailymotion.com/embed/video/x4go4jp"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br/&gt; 


</description>
      <pubDate>Wed, 15 Jun 2016 04:00:00 GMT</pubDate>
      <dc:creator>Popular Science</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342360/west-point-cadets-are-shooting-down-drones-with-cyber-rifles/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>IoT attacks threaten national security, say cyber experts</title>
      <link>https://cyber.army.mil/News/Article/1342251/iot-attacks-threaten-national-security-say-cyber-experts/</link>
      <description>"Dams, the power grid and other such infrastructure were once closed network systems. Then they were&lt;br/&gt; 


</description>
      <pubDate>Fri, 22 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>DVIDS</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342251/iot-attacks-threaten-national-security-say-cyber-experts/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Palo Alto Networks CEO on cybersecurity vs. privacy</title>
      <link>https://cyber.army.mil/News/Article/1342349/palo-alto-networks-ceo-on-cybersecurity-vs-privacy/</link>
      <description>"Palo Alto Networks CEO Mark McLaughlin on efforts to improve cybersecurity."&lt;br/&gt; 


</description>
      <pubDate>Fri, 22 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>Fox Business</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342349/palo-alto-networks-ceo-on-cybersecurity-vs-privacy/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Wanted: talented cyber operators</title>
      <link>https://cyber.army.mil/News/Article/1342352/wanted-talented-cyber-operators/</link>
      <description>"Regarding cyber, "we are training in the dozens and our adversaries are training in the thousands,"&lt;br/&gt; 


</description>
      <pubDate>Fri, 22 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>Army.mil</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342352/wanted-talented-cyber-operators/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Critical Infrastructure Vulnerable to Attack, NSA Leader Says</title>
      <link>https://cyber.army.mil/News/Article/1342239/critical-infrastructure-vulnerable-to-attack-nsa-leader-says/</link>
      <description>"Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry,&lt;br/&gt; 


</description>
      <pubDate>Thu, 21 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>Defense.gov</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342239/critical-infrastructure-vulnerable-to-attack-nsa-leader-says/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Former NSA Director: U.S. Needs Security, Privacy</title>
      <link>https://cyber.army.mil/News/Article/1342311/former-nsa-director-us-needs-security-privacy/</link>
      <description>"Top military and industry leaders convened at a cyber-summit at West Point, New York Thursday to&lt;br/&gt; 


</description>
      <pubDate>Thu, 21 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>Fox Business</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342311/former-nsa-director-us-needs-security-privacy/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Homeland Security Secretary: No imminent threat to U.S.</title>
      <link>https://cyber.army.mil/News/Article/1342345/homeland-security-secretary-no-imminent-threat-to-us/</link>
      <description>"Department of Homeland Security Secretary Jeh Johnson talks exclusively with FBN’s Jo Ling Kent at&lt;br/&gt; 


</description>
      <pubDate>Thu, 21 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>Fox Business</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342345/homeland-security-secretary-no-imminent-threat-to-us/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Strategic Amnesia and ISIS</title>
      <link>https://cyber.army.mil/News/Article/1342488/strategic-amnesia-and-isis/</link>
      <description>"MARK TWAIN observed, “history doesn’t repeat itself, but it does rhyme.” The study of military&lt;br/&gt; 


</description>
      <pubDate>Thu, 21 Apr 2016 04:00:00 GMT</pubDate>
      <dc:creator>The National Interest</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342488/strategic-amnesia-and-isis/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Apple's Dilemma: Customer Privacy or Help the Fed</title>
      <link>https://cyber.army.mil/News/Article/1342220/apples-dilemma-customer-privacy-or-help-the-fed/</link>
      <description>"West Point's Cyber Policy Fellow Dr. Aaron Brantly and U.C. Berkeley's James Dempsey debate Apple's&lt;br/&gt; 


</description>
      <pubDate>Thu, 18 Feb 2016 05:00:00 GMT</pubDate>
      <dc:creator>CNBC</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342220/apples-dilemma-customer-privacy-or-help-the-fed/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Task Force Green Dragon: Preparation of the Environment in New England Taverns</title>
      <link>https://cyber.army.mil/News/Article/1342476/task-force-green-dragon-preparation-of-the-environment-in-new-england-taverns/</link>
      <description>"Regardless of era, before active armed combat begins in a battlespace, commanders often have a&lt;br/&gt; 


</description>
      <pubDate>Tue, 16 Feb 2016 05:00:00 GMT</pubDate>
      <dc:creator>War on the Rocks</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342476/task-force-green-dragon-preparation-of-the-environment-in-new-england-taverns/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Cyber Resiliency: Bridging a Cyber Capability Gap in 2025</title>
      <link>https://cyber.army.mil/News/Article/1342481/cyber-resiliency-bridging-a-cyber-capability-gap-in-2025/</link>
      <description>"The United States Army must develop a holistic solution to Army-wide cyber resiliency and hardening&lt;br/&gt; 


</description>
      <pubDate>Fri, 05 Feb 2016 05:00:00 GMT</pubDate>
      <dc:creator>Small Wars Journal</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342481/cyber-resiliency-bridging-a-cyber-capability-gap-in-2025/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
    <item>
      <title>Going Native: A Career Pipeline For U.S. Military Success Out in Silicon Valley</title>
      <link>https://cyber.army.mil/News/Article/1342215/going-native-a-career-pipeline-for-us-military-success-out-in-silicon-valley/</link>
      <description>"Just as we needed people who could interpret for us in Afghanistan and Iraq, so do we need soldiers&lt;br/&gt; 


</description>
      <pubDate>Thu, 14 Jan 2016 05:00:00 GMT</pubDate>
      <dc:creator>Foreign Policy</dc:creator>
      <guid isPermaLink="false">https://cyber.army.mil/News/Article/1342215/going-native-a-career-pipeline-for-us-military-success-out-in-silicon-valley/</guid>
      <category>News and Media 2016</category>
      <category>News Story</category>
    </item>
  </channel>
</rss>