By hacking a system from within, security experts can identify vulnerabilities and try to stay one step ahead of increasingly sophisticated cyber criminals.
The arrival of a new president representing a different political party presents a host of opportunities for reforming the defense acquisition process, particularly as it relates to cyber.
Commanders and staff always are seeking the “next best” solution to attain supremacy over adversaries in the pivotal domains of command, control, communications, computers, combat systems, intelligence, surveillance and reconnaissance, or C5ISR.
The Defense Department could assert that the nation held the defining edge in nocturnal warfighting capability, thanks to massive acquisition efforts in night vision optics and weapons platforms for troops.
I feel a sense of disappointment as I think about how much the cyberspace landscape has changed over the last 40-plus years and how little our nation’s privacy laws have done to keep up with this digital transformation.
This year, consider donating your old electronics to benefit the AFCEA Educational Foundation. It’s a simple way to clear your e-clutter, and you could reap a tax benefit.
An increased reliance on the IoT offers potential liabilities, such as security challenges and availability, along with a heavy dependence on technology in what is sure to be a contested or denied future warfighting environment.