Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
Securing the Defense Industrial Base
Cybersecurity is at the forefront of protecting the nation and its warfighters. Modern capabilities such as cloud and zero trust help achieve that mission.
Image
For China, ICT Is Priority 1
The 80-page summary of China’s recently published five-year plan (5YP) establishes information and communications technology (ICT) as the country’s highest priority.
Budget Problems Impact Science and Technology Personnel as Much as Programs
Gadgets and gizmos are not the only things beset by the U.S. Defense Department’s continued battle with shrinking budget dollars.
Image
Sweeping Acquisition Changes on Horizon for NATO Agency Reshaping How it Buys Software
Sweeping changes are on the horizon for one NATO agency as it reshapes its software acquisition processes and embarks on a task to create what officials call an in-house “software factory.” The NATO Communications and Information (NCI) Agency wants to overhaul the way it buys software after inspections revealed acute shortcomings that led to several program cost overruns and delays.
Image
Cybersecurity Bucks Being Invested in Shelfware
Organizations confused about how to assess cybersecurity investments.
Data Takes a Central Role in JADC2 Strategy
The Joint All Domain Command and Control plan centers on how to achieve a data advantage.
Image
West 2010 Online Show Daily: Information Is the New Sextant for a Networked Navy
All the chief of naval operations did on the last day of West 2010 was describe the future U.S. Navy and its top requirements. Adm. Gary Roughead, USN, told an overflow audience at the three-day event’s final luncheon that the Navy will be built around information, in both technology and practice.
Best Practices for Integrated Cybersecurity
Keep it simple when implementing cyber solutions.
Image
TechNet Asia-Pacific 2011 Online Show Daily: Day 3
The nation’s critical infrastructure may be in more peril than anticipated as its new technology capabilities increase network vulnerability. A similar threat may extend to longtime military networks that suddenly are not as certain to be available when needed.
16th Air Force Flies in the Gray Zone
The Numbered Air Force is working to meet and beat the enemy in the nontraditional warfighting environment.
Image