Access control will always be critical, but it is just the first important step of the zero trust journey.
We all need to support a vital culture change to remove obstacles for women so they can focus on their missions.
"There is simply no excuse for our antiquated, byzantine procurement process."
End-to-end encryption is indeed the gold standard for data security and goes a long way towards achieving the level of protection the CMMC envisions.
A Young AFCEAN proposes that AFCEA International create an AFCEA ribbon to be presented to JROTC cadets studying science, technology, engineering and mathematics.
The open systems interconnection model is a seven-layer model that allows digital products to operate and communicate with other communication devices.
As people around the world practice self-isolation due to COVID-19, the need to maintain a strong cybersecurity posture arguably has never been higher.
Government personnel have more than enough data, but they don’t have the tools required to effectively leverage it.
The DOD should remove the test requirement for defense software and fully incorporate machine learning.
To realize the full potential of artificial intelligence, government agencies need to build on industry innovation.
During disasters, public sector agencies, nonprofits and emergency response organizations must all work together to protect the data of everyone involved, from volunteers to first responders to victims.
"While the cloud can accelerate the DOD’s efforts toward information dominance, the agency should adopt a measured approach to cloud migration."
Combating digital identity fraud is a never-ending challenge.
Our attack surface and complexity are only expanding as commercial, government and Defense Department networks modernize and move to the cloud and software-defined networks.
Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.
As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.
Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.
The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.
The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.
Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.