The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.
The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.
The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.
The intelligence community must find a way to work with the private sector, or it risks falling dangerously behind in the key technologies that are reshaping society.
The advanced skill sets of intelligence and cyber professionals now are applicable across the spectrum of the business world. Government risks losing this valuable group of people unless it changes its ways.
Does artificial intelligence (AI) pose a threat to the human race, as many notable technologists recently have suggested? And what should be its role in the intelligence community?
It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.
Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.
The U.S. intelligence community's leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected.
Today more than ever before, it’s all about information. But, it turns out that Sneakers script writers only scratched the surface.
Guest blogger Lewis Shepherd says poll results can be surprising, especially when it comes to young people's views on the U.S. intelligence community.
Today’s intelligence community is facing new challenges. That in and of itself is not new; the community has been evolving for decades. What is new is both the changing nature of the threat and the approach that must be taken to meet it.
Researchers from the United States and the United Kingdom aim to identify inconsistencies between the data provided by intelligence, surveillance and reconnaissance technologies and the understanding of that data by combat soldiers or other emergency personnel.
The U.S. Office of the Director of National Intelligence is matching the technology needs of the intelligence community to the capabilities of the private sector with the goal of speeding innovation to the user community as well as introducing community specialists to new technologies.
The agency tasked with generating geospatial intelligence will be relying significantly on new commercial satellites that will increase the richness of the intelligence it provides its customers.
The organization tasked with deploying and maintaining orbital reconnaissance assets is working on improving its ground architecture to keep those space-based capabilities relevant amid a changing threat picture.
Guest blogger Terry Roberts shares concerns about the ability of government to continuously attract, recruit and enable top talent of all ages, educational and experiential backgrounds. After all, organizations and companies alike are only as good as their leadership talent pool.
Guest blogger Bill Nolte discusses the need for a strategic review of America's intelligence.
In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.
The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.