More Than Just Your Regular Cyberthreats

A classified event is nothing short of interesting. A classified cyber forum is nothing short of mandatory.  

U.S. Army Chief of Staff Gen. Mark A. Milley, USA, visits soldiers serving with the cyber electromagnetic activities (CEMA) support to corps and below (CSCB) team, 780th Military Intelligence Brigade, in May at the National Training Center in Fort Irwin, California. Photo by Sgt. 1st Class Chuck Burden, USA Army Accelerates Cyber, EW Integration

U.S. Army puts its organizational architecture on the line, prioritizing the newest warfighting domain while converging it with re-emerging combat disciplines.

How the Hashtag Is Changing Warfare

Bots are used to manipulate opinions and advance agendas, and identifying, countering and degrading bot armies requires new tactics—battle-ready tactics.

The CONUS Defense Department environment shares data and information amid complex networking. A secure and effective environment could be ensured using an approach known as Digital Network Architecture, or DNA. Man and Machine Marry to Fight Cyber Attacks

Highly skilled cyber analysts play an important role, but to achieve peak performance from both human and machine, automation within the network is needed.

Military SSDs Are MVPs of Data Storage

The use of COTS SSDs in defense applications comes down to trust. Are these storage devices rugged and secure enough to meet military application challenges?

Lt. Gen. Alan Lynn, USA, director of DISA and commander of the JFHQ-DODIN, speaks at AFCEA’s Defensive Cyber Operations Symposium in June. Photo by Mike Carpenter Wanted: Top Technology, Talent for Federal Cyber

Conquering cyberthreats that pose a national security risk means acquiring cutting-edge technology and leading-edge talent and pairing them.

1
2
3
4
5
6