Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3776 Results
When Budgets Go Lean, Military Communications Adapt
In the coming decade, the mantra of doing more without more could become one of the defining hallmarks of military communications—not only for the United States, but also among the nation’s coalition partners and allies.
Simple Steps for Social Media Security
Social networks are a great way to stay connected with others, but users, particularly millennials, should be wary about how much personal information they post.
Image
Cybersecurity Embraces the New Normal: Sponsored Content
Remote work, distributed networks emphasize different approaches to network security.
DISA Reorganization Addresses Contracting Challenges
Tighter budgets and increased reliance on industry drive supply and demand changes.
THINKING AND SELLING... "OUT OF THE BOX" TO THE INTELLIGENCE COMMUNITY (IC)
I see some true leadership coming out of selected individuals in the IC and it is inspiring. Sure, there are a million things that could be better and nobody would deny this. However, my philosophy is that we need to support the ones who are in charge, and help them do their job. This is the system we have. Working against it won’t help you reach your goals and certainly will not help the nation reach its goals.
CMMC Measures Should Be Applied Early, Says Pentagon Official
The defense community should not wait for CMMC formalization to practice its security.
Image
Proper Training is at the Crux of Multidomain Operations
For the Army, investing in its people is the service’s way to be effective in all domains, leader says.
Image
Complementary Actions Define New DISA Strategy
Five not-so-easy pieces characterize the agency’s plan for the future.
Image
Asia-Pacific Communicators Offer Technology Wish Lists
At AFCEA TechNet Asia-Pacific, a panel of U.S. military communications officers stationed in the Asia-Pacific region told the defense technology industry what they most need to accomplish the mission. The list included capabilities ranging from next-generation authentication tools to airborne command and control network modeling.
Image