Slide show not loaded.
AFCEA Leadership 5 Questions: Sgt. Maj. Al McMichael, USMC (Ret.)
Better Buying Power: The Next Generation
At a time of increased budget scrutiny and ever changing threats, the Pentagon must make key changes to the way that it procures almost everything. In this episode of AFCEA Answers, Frank Kendall, undersecretary of defense for acquisition, technology and logistics, previews the upcoming release of Better Buying Power 3.0.
Hosted Payloads Might Be Pentagon's Affordable Way into Space
The U.S. Defense Department's experimental "pathfinder" hosted payload satellite program might be the feasible short-term middle ground sought between commercial satellite providers and the federal government.
Forum Gives Small Businesses Tips to Combat Cybersecurity Threats
The doomsday rhetoric presented by cybersecurity experts at an issue forum served as a wakeup call to the enduring cybersecurity vulnerabilities.
U.S. Navy Developing Fleet of Autonomous 'Guard Dogs'
The U.S. Navy is capitalizing on a first-of-its-kind autonomous technology that can transform just about any surface vessel into an unmanned platform able to protect other ships or "swarm" hostile vessels.
More Online Exclusives
Stories you won't find in SIGNAL Magazine.
SIGNAL Blogs and News Briefs
More than a dozen years of warfighting in Southwest Asia have changed the face of tactical operations. Program systems continued to work their way into the force, but wartime exigencies led to new technology insertion activities that sped badly needed innovations to warfighters. Now, with the wars winding down, planners are turning back to methodical programs for equipping forces with the best information technologies available. But those lessons learned in Southwest Asia and the corridors of the Pentagon still are being applied as leaders constantly strive to upgrade tactical communications and electronics systems.
CLOUD SECURITY AND RECOVERY
The cloud is not the future; the cloud is today. Government and industry are accelerating moves to the cloud, and these activities are opening the door to new capabilities. But with all these efforts comes the same peril that plagues earthbound information systems and networks: cyberthreats. The cloud offers its own set of unique security issues, and with increasing reliance on it comes greater urgency to secure vital data.
For these topics and more: