lockheed martin - News, Features, and Slideshows

News

  • 3D printing adds new dimension to business innovation

    3D printing may have an image problem. It's sometimes seen as a hobbyist pursuit -- a fun way to build knickknacks from your living room desktop -- but a growing number of companies are giving serious thought to the technology to help get new ideas off the ground.

  • Security roundup: Lockheed Martin sounds alarm on Adobe Reader zero-day; Microsoft patchfest coming

    When Adobe last week issued an <a href="https://www.adobe.com/support/security/advisories/apsa11-04.html">advisory</a> about a dangerous <a href="http://www.networkworld.com/news/2011/120611-hackers-exploit-adobe-reader-zero-day-253810.html">zero-day attack</a> based on an unpatched Adobe Reader vulnerability that was being exploited in the wild to try and seize control of both PCs and Macs, it credited Lockheed Martin for sounding the alarm about it.

  • Biometrics scares most people

    Biometrics — the security method for identifying an individual by making a match of fingerprints, iris, face, voice, DNA and other <a href="http://www.networkworld.com/news/2011/092811-biometrics-war-machine-251352.html">unique physical traits</a> — scares people, an industry leader in the field acknowledged this week. But enterprise technology managers say there's no doubt biometrics is a boon to enterprise security.

  • Are CIOs Too Cocky About Security?

    There's been no shortage of high-profile and damaging data breaches in the past year. And the targets are widely varied-they include security firms RSA Security and HBGary Federal, defense contractors Lockheed Martin and Northrop Grumman, entertainment giant Sony, major retailers, healthcare companies and marketing firms.

  • Security pros come clean at Summit on Advanced Persistent Threats

    Put about 100 chief information <a href="http://www.networkworld.com/topics/security.html">security</a> officers, CIOs and CEOs into a room and what they are willing share about cybersecurity just might surprise you. More information about just what they shared will be revealed soon in a report stemming from a closed-door Summit on Advanced Persistent Threats held in Washington, D.C., in July, where business and government security professionals acknowledged to each other that their organizations had either been hacked through stealthy infiltration to steal valuable sensitive information and intellectual property, or that they wouldn't know it if it had been.

  • Northrop Grumman constantly under attack by cyber-gangs

    NATIONAL HARBOR, Md. -- About a dozen separate legions of organized hackers have been diligently attempting for years to break into aerospace and defense company Northrop Grumman to steal sensitive information, the company's chief information <a href="http://www.networkworld.com/topics/security.html">security</a> officer (CISO) said at a Gartner security conference here.

  • Pentagon building Internet simulator to practice cyberwar

    A model of the Internet where the Pentagon can practice <a href="http://www.networkworld.com/news/2011/060611-cyberwar.html">cyberwar</a> games -- complete with software that mimics human behavior under varying military threat levels -- is due to be up and running by this time next year, according to a published report.

  • Cyberattacks fuel concerns about RSA SecurID breach

    Recent attacks against two major defense contractors are fueling concerns about the extent to which RSA's SecurID two-factor authentication technology may have been compromised in a breach the company acknowledged in March.

  • Opinion: RSA - Maximising customer harm

    When news of the major RSA breach broke about two months ago I complained that the company was not being all that upfront in telling customers what the breach might mean to them.

  • Lockheed Martin acknowledges 'significant' cyberattack

    Lockheed Martin Saturday night acknowledged that it its information systems network had been the target of a "significant and tenacious attack," but said that its security team detected the intrusion "almost immediately and took aggressive actions to protect all systems and data."

[]