Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Services Choose Independent Paths for JADC2
The J-6 institutes a strategy of convergence for realizing the vital goal.
Image

Reactions to Cloud Strategy Only Partly Sunny
Experts seek answers on implementing the cloud computing strategy.
Image

Innovating Military Management Systems To Mitigate Hardware-Related Vulnerabilities
Overhauling, optimizing and automating U.S. Army logistics and information technology management systems can prevent exploitation of hardware-related vulnerabilities.
Image

Pacific Rim's Shot at Harmony
PACOM has the overarching responsibility for ensuring security in the Asia-Pacific region. The organization's commander offers that if PACOM can get its five focus areas right, it will have achieved its goals and enable it to focus on other challenges. What's the ideal future scenario? Read the complete interview and share your input.
DOD Targets Acquisition Reform
Tackling contracting processes will help the U.S. military bring in secure and innovative capabilities to support the warfighter.
Image

The Military Needs JIE, and JIE Needs Innovation
Building an all-encompassing network environment will require new technologies as well as new approaches to information engineering.
Image

DISA's New Task Force Aims To Operationalize Data
DISA Global technical director speaks on a recently launched initiative, as well as some of the key challenges it has faced. Still, the show must go on.
Image

Infrastructure Resilience Vital for Homeland Security
Conference will focus on emerging trends and technologies protecting the nation’s physical and cyber spaces from adversaries.
Image

DISA Strives to Exploit the Pace of Change
New technologies are affecting the information agency both positively and negatively.
Image
