Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3840 Results
Joint Operations Are Complex and Diverse
This edition of SIGNAL Magazine includes a focus report on joint operations, and AFCEA holds its Joint Warfighting Conference, partnered with the U.S.
President's Commentary: EW Puts Technology-Based Forces at Risk
We may be technologically superior, but we are not technologically dominant. We must do a better job of integrating EW into operations.
Study Considers Characteristics of the Future Work Force
With machines augmenting the work force, humans will perform more mission-critical work, Deloitte report predicts.
Image
Resetting the Balance in Public-Private Partnerships
It’s more than just a cliché, but not enough people realize what really must be done.
Don't Be Asleep When Protecting Data at Rest
Watching my Cousin Billy in my backyard lying in a hammock as I prepared for my 4th of July barbecue reminded me why protecting Data at the Rest (DAR) is so important. Data at rest is a lot like Billy. Most of the time it just sits around not doing much, but it will move and work if you prod it. But, it isn’t the lack of initiative that bothers me. It’s the potential for the loss of information that keeps me up at night.
The Need for Speed With Software Delivery
President's Commentary
Image
The Bottom Line: 5 Ways Technology Has Changed the World
Cyberspace already is the new battlefield. Is the military ready?
President's Commentary: Heed the Coronavirus Wakeup Call
The coronavirus has justifiably prompted deep concerns over the security and stability of the U.S. supply chain and major portions of the critical infrastructure upon which our nation and our partner nations have become so dependent.
The Responsibility of Reciprocity
At the heart of "DoD Information System Certification and Accreditation Reciprocity" is the policy that if a system owner from any service hands a certified and accredited system to the network owner from any other service, the network owner should have the confidence that putting that system on his or her network will not result in creating information assurance or related vulnerabilities. Can we handle this?