Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 25536 Results
Executive Commentary: Changes Both Compel and Restrict Zero Trust
Zero trust represents a cultural shift from today’s approach. Yet, it also must be applied in ways that do not prevent the secured data from being effectively exploited by its users.
Keylime Provides Root-of-Trust at Scale
The firmware zero-trust architecture is ready for prime-time, cloud-based deployment.
Image
Army Hones On-the-Move Communications
Commercial technologies form the backbone of new mobile connectivity.
Image
Losing the Trailer
The Army examines solutions for more agile satellite dish setup.
Sponsored Content: Q&A: The Importance of Dynamic Zero Trust for the DoD
Making the connection between people-defined security and zero-trust architectures.
Recipient of Ciena STEM Teacher Grant Helps Children Learn Coding
Jewell was a recipient of the Ciena STEM Teacher Grant this year and used her funding to introduce her students to BeeBots.
Image
On Point: Q&A With David Benhaim
Q&A with David Benhaim, CTO and co-founder of Markforged.
Cole Engineering Services is Providing Cyber Training Capabilities
Cole Engineering Services Inc., Orlando, Florida, was awa
Sponsored: Controlling Cost with Control Room Ergonomics
Many organizations struggle to balance the need for highly ergonomic control rooms with the investment they carry.
Image
Sponsored: Cloud Native Architecture vs. Cloud Resident Solution
What is the difference and significance between cloud-native and cloud-resident solutions?
Image