Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.
As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.
Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.
The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.
The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.
Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.
WebRTC aligns with the Defense Department’s plans for cloud computing, collaboration and adoption of more open-source platforms.
Automated systems significantly reduce errors that can lead to a data breach and can increase the chance of identifying, intercepting and defeating cyber attacks in real time without increasing workloads.
Smartphones, tablets and wearable systems enable real-time analytics and data collection to ensure soldiers achieve peak health and performance on the battlefield.
Open source containers come with real benefits and real questions, too.
As large defense contractors invest heavily in securing their networks, adversaries turn their attention to smaller defense suppliers for cyber attacks.
Proper planning can help to alleviate many common data migration pitfalls.
Malicious actors have put significant manpower into compromising small- and medium-sized businesses.
Artificial intelligence is not smart enough to replace humans in cybersecurity.
IoT-connected devices and apps have the potential to do some serious damage.
We have an opportunity to develop the most advanced satellite communications system ever built.
Military and government are benefiting from a fast and effective encryption solution.
Federal administrators should balance the desire for modern software-defined networking solutions with the realities of government.
Create solutions that put data to work with secure intelligence from device to cloud.
When another threat rears its head, government networks and the professionals who manage them can be better equipped to meet it head on.