Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Scaling for the Department of the Air Force Battle Network
Initial success will allow the foundation to grow quickly for the warfighting network.
Image

Game-Changing Environment Vexes Planners, Warfighters
The dynamic environment that defines trends from social development to technology innovation is wreaking havoc on attempts to plan an effective national security structure. Coupled with severe budget limitations arising from the global economic crisis, this rapidly changing milieu is revolutionizing warfighting in ways that cannot be countered—or even predicted—on short notice.
Aligning Acquisition and Sustainment for a New Era
The Defense Department is making inroads in improving its contracting processes.
Image

Homeland Security Activities Pushing Information Sharing Advancements
Reliable federal and state homeland security coordination hinges on information sharing, interoperability, governance and trust. But achieving the right mix of these elements among governments, law enforcement agencies and the private sector presents both cultural and technical challenges.
DISA Seeks Ideas, Innovation and Collaboration
For the leadership of the Defense Information Systems Agency, the opportunity to meet and greet with the contractors and companies that supply mission-critical applications and hardware is vital to their mission. That is why DISA has been holding its Customer and Industry Forum for the last several years.
Sponsored: Digital Transformation Insights from Gen. McChrystal
The digital transformation is no longer simply an enabler—it's the structure for everything.
Image

Networked Medical Devices Deliver Benefits, Drawbacks
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
Image

A New Front in Information Warfare
The U.S. government and citizens must prepare to defend democracy and assess the truth.
Image

The Silent Vulnerabilities of Operational Technology
OT security gaps expose critical infrastructure to exploitation, requiring collaborative efforts and oversight.
Image

Incoming: Toward a Stronger Military with Smartest Systems
A joint architecture, built on commercial standards and interfaces, powered by artificial intelligence and allowing the military to fight as a unified force—could it be that its time has finally come?