Search Results for "" The Cyber Edge ""
Not finding what you’re looking for?
10 of 914 Results
The Military Metaverse and the Future of Large-Scale Combat Operations
New approaches are needed to ensure victory in future operations.
Image

Shields Up: Improving Nationwide Safeguards
CISA’s effort offers a greater layer of protection against malicious cyber and critical infrastructure attacks.
Image

New Law Is an Opportunity To Grow Cyber Experience
Workforce program will allow federal employees to advance cyber skills through rotational positions.
Image

Software Factories: The Successful Path of Failure
An ecosystem emerges that crosses services and blurs the line between civilian and military innovation.
Image

How Agencies Can Defend Against Killware
A new threat emerges that needs to be addressed by the military community.
Image

Identifying Shared Vulnerabilities and Mitigation Strategies for Cloud, Wireless and IoT
Considering common characteristics could be key to effective security.
Image

Adversarial Machine Learning Poses a New Threat to National Security
A rapidly growing field of technology holds significant implications for U.S. military.
Image

Securing Machine Learning Requires a Sociotechnical Approach
Considering AI interactions with humans, organizational structures and strategies may help defenders mitigate risks.
Image

Soldiers Supply Secure Software Solutions
The Army software factory begins with security.
Image

On Point: Q&A With Raj Iyer
Q&A with Raj Iyer, Army chief information officer, who advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.
Image
