Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Security Concerns Rising in the Age of IoT
Experts call for uniform standards to reduce the vulnerabilities of smart technology.
Image

The Army Shapes Joint All-Domain Operations
The service’s Futures and Concepts Center is taking its multidomain concept to the joint level.
Image

Information Warfare for Today’s Marines
The deputy commandant for information expands the crucial foundation for a fleet-ready information advantage.
Image

Chief Information Warriors Describe Imminent Changes
The stars were out this morning as Lt. Gen. Dennis Via, USA, director, C4 systems, J-6, the Joint Staff, kicked off today's MILCOM 2009 activities.
Army Plays High-Tech Cat-and-Mouse Game
Keeping apace of change remains a challenge.
Image

Software-Defined Defense Is Necessary for Future Warfare
Digitized operations are crucial in the next decades of war.
Image

DevSecOps Puts Security at the Heart of Program Development: SPONSORED
Methodology builds cyber considerations into DOD programs from the beginning.
DEBRIEF FROM THE WHITE HOUSE FORUM ON IT MANAGEMENT REFORM
If you are an enterprise technologist in or out of the Federal Government, please take time to watch the entire presentation below. It captures the entirety of the presentations and majority of the conversations at the White House Forum on Information Technology Management Reform.
I recommend you watch the entire presentation for several reasons. If you are a student of IT and its governance, you will see what a good strategy looks like. If you are a student of federal policy, you will gain insights into what may be some of the most important shifts underway in the federal space today. If you are an integrator or technology vendor who served federal users you will learn a bit more about how your customer will be shifting in the future and how you can better position to help. And if you are an enterprise technologist you will learn of some very important things under way that will make your life easier and more productive.
Disruptive by Design: Some Leaks Can't Be Stopped. We Can Plug the Rest.
Understanding why leakers leak is just as important as grasping how they do it. Determining the motives behind someone’s deliberate action to share government secrets requires concerted due diligence after the incident.
Image
