Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
The Silent Vulnerabilities of Operational Technology
OT security gaps expose critical infrastructure to exploitation, requiring collaborative efforts and oversight.
Image
Incoming: Toward a Stronger Military with Smartest Systems
A joint architecture, built on commercial standards and interfaces, powered by artificial intelligence and allowing the military to fight as a unified force—could it be that its time has finally come?
AFRICOM Endeavors to Build Communication Capabilities
An annual symposium with African partners provides foundational lessons for interoperability.
Image
Navy and DoD Launch Post-Quantum Resistant Crypto Effort
The initiative marks the beginning of a long journey in this complex space.
Image
DISA Europe Marches Forward With Modernization Efforts
DISA Europe is modernizing its networks, improving cybersecurity capabilities and strengthening its ties across the continent, all to support warfighter capabilities.
Image
Annual Assessment Lists Primary Threats to U.S. National Security
The report, published March 2025, lists a variety of non-state actors and major state actors that threaten U.S. national security.
Image
C2 Superiority in an Era of Technological Competition
JADC2 can only be achieved with revolutionary technologies.
Image
AFCEA Celebrates 75 Years of Innovation, Strength and Engagement
The 75th anniversary, which AFCEA celebrates this year, is traditionally known as the diamond anniversary.
Image
Launching Stealth Warfare
The next “shot heard ’round the world” may turn out to be the surreptitious movement of millions of bits and bytes careening through cyberspace. Suspicions already surround the cyberactivity that took place in the weeks before Russia launched a conventional military attack against Georgia last year. And in May 2007, the removal of a bronze statue of a World-War-II-era Soviet soldier from a park in Estonia resulted not in riots in the streets but rather in what has been described as the first war in cyberspace. These incidents may indicate how adversaries—and the United States military—could deploy cyberweapons as the first line of offense prior to traditional kinetic activity.
An EPIC Winner
Founder of Virginia-based Frost Mountain, David Vigna, wins this year’s EPIC Challenge.
Image