Table of Contents: August 2017
Army Cyber Education Enlists Field Operations
Electronic warfare joins the digital realm in a confluence of activities to adjust to evolving threats.
Software-Defined Network Needed Sooner Rather Than Later
Shifting the focus from hardware to software is overdue.
Creating a Common Language Of Cybersecurity
Standardized terms can produce a comprehensive threat picture.
GOVERNMENT ID MANAGEMENT
Cracking the Code on Identity Management
Promising techniques and technologies could put the common access card in the past and protect against faux users.
DISA Moves Beyond Conventional Biometrics
Officials are creating a prototype that will verify mobile user identity based on life patterns.
IAM Proves You Are Who You Say You Are
But people complicate this process of identity and access management.
A Grass-Roots Approach to Connecting NATO Forces
Multinational partnerships between signal units explore interoperability solutions.
New Weapons in Battle To Dominate Spectrum
Next-generation receiver technology provides greater coverage and real-time data analysis.
DISRUPTIVE BY DESIGN
Some Leaks Can’t Be Stopped. We Can Plug the Rest.
Ground Forces March to Cyber Battlefield
New Frontiers in Autonomy, Spectrum Management
AFCEA EDUCATIONAL ACTIVITIES
AFCEA Scholarship Recipients Share Meaning of Their Awards