Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Data Fabric Weaves Modernized Fires Mission Thread
Data tightly ties sensors to shooters.
Image

CAR Talk
What do bad brakes, invading termites, leaky dams and equally leaky military networks have in common? They are conditions that can result in significant damage if not addressed but are easily avoided through attention, upkeep and paying attention to Certification and Accreditation (C&A) Process, DIACAP, resulting in an Approval to Operate (ATO) or an Interim Approval to Operate (IATO). . There are a number of people who will tell you that keeping them in good IA order is too much work and/or too costly. These are usually the people who have “more important things to worry about” or MITT-WA.
All-Domain Marines Take to the Fleet
For the Marine Corps, advancing multidomain operations means tying closer to the Navy.
Image

Incoming: As We Pivot Into the Future
Lt. Gen. Lawrence presents her last Incoming column with a look back at the central premise of her work.
Defense Department's DevSecOps Initiative Is on the Move
The military is aggressively rolling out an advanced software development environment.
Image

Contract Prospects Come Knocking
The Transportation Security Administration boasts several high-value awards on the horizon.
Image

Looking Within and Looking Beyond the Far Horizon
U.S. sea services are contemplating a future based on innovation while keeping a wary eye on events half a world away.
Image

Nontraditional Roboticists to Hit DARPA’s Fast Track
Robotics Fast Track effort seeks to cut costs and time by engaging developers who have not worked with the federal government.
Image

Guest Blog: A Brief Look into the Cybersecurity Framework
Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.
DOD Strives To Revolutionize Software Acquisition
The new strategy is expected to help soldiers obtain advanced technologies and capabilities more quickly.
Image
