During disasters, public sector agencies, nonprofits and emergency response organizations must all work together to protect the data of everyone involved, from volunteers to first responders to victims.
"While the cloud can accelerate the DOD’s efforts toward information dominance, the agency should adopt a measured approach to cloud migration."
Combating digital identity fraud is a never-ending challenge.
Our attack surface and complexity are only expanding as commercial, government and Defense Department networks modernize and move to the cloud and software-defined networks.
Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.
As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.
Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.
The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.
The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.
Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.
WebRTC aligns with the Defense Department’s plans for cloud computing, collaboration and adoption of more open-source platforms.
Automated systems significantly reduce errors that can lead to a data breach and can increase the chance of identifying, intercepting and defeating cyber attacks in real time without increasing workloads.
Smartphones, tablets and wearable systems enable real-time analytics and data collection to ensure soldiers achieve peak health and performance on the battlefield.
Open source containers come with real benefits and real questions, too.
As large defense contractors invest heavily in securing their networks, adversaries turn their attention to smaller defense suppliers for cyber attacks.
Proper planning can help to alleviate many common data migration pitfalls.
Malicious actors have put significant manpower into compromising small- and medium-sized businesses.
Artificial intelligence is not smart enough to replace humans in cybersecurity.
IoT-connected devices and apps have the potential to do some serious damage.
We have an opportunity to develop the most advanced satellite communications system ever built.