Federal employees continue to express overall discontent with their jobs, agencies and senior leadership, and the dissatisfaction leads to a staggering amount of lost productivity, experts say.
Government officials, academia, business leaders, policy wonks and security experts have been mulling over how to implement an effective cybersecurity strategy for years. Being a domain that is incredibly dynamic and loosely defined and operating in a constantly shifting environment does not mean that the quest for a solution must be interminable. The adoption of thoughtful, well-crafted cybersecurity policy must quickly move from theory to practice—now. And this move must be holistic.
World events have caused the U.S. Navy to once again focus on antisubmarine warfare, in part, by building the P-8A Poseidon multimission maritime aircraft to replace the aging P-3 Orion. When it comes to getting the P-8A to the warfighter and keeping the older P-3 in the air, the buck stops with Rear Adm. CJ Jaynes, USN, program executive officer, air anti-submarine warfare, assault and special mission programs (PEO(A)).
For more than half the history of our country, one of the surest ways to be elected president was to gain public fame as a general in the U.S. Army. Since the tumultuous 19th century, we have fallen out of the habit of electing generals. But the one exception to the rule turned out to be Dwight D. Eisenhower, former five-star general, former commander of Allied forces in Europe in World War II, first supreme commander of NATO and a two-term president who defined an era.
Multiple transnational organizations are moving to ensure security in an increasingly dynamic environment in Europe.
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation.
Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality.
With the information world marching en masse to the cloud, one global firm is offering direct peer-to-peer encryption to reduce the threat of an intervening cyber intercept. This approach is applicable to dedicated hardware as well as to commercial off-the-shelf consumer communications equipment, and its operation is relatively transparent to the user.
U.S. Navy officials have, for the first time, proved that the unmanned X-47B aircraft and an F/A-18 Hornet can operate at the same time within the same aircraft carrier-controlled landing pattern. Manned and unmanned aircraft flying from the same flight deck may change the way warfighters operate in the decades to come.