Not finding what you’re looking for?
Assured Cross-Domain Access Through Hardware-Based Security: Sponsored Content
The military services have wrestled for decades with the challenge of communicating and sharing data securely with each other, let alone with non-DoD partners and allies.
Meeting DoD's Data Challenges with a Federated Data Strategy: Sponsored Content
The military application of transformative technologies like AI and mixed reality relies on data the way conventional military power relies on ammunition.
Achieving Decision Dominance by Empowering the Tactical Edge: Sponsored Content
In modern warfare, against near-peer adversaries, victory will no longer be guaranteed by strength of arms alone.
Leveraging Software Emulation to Root Out Hackers: Sponsored Content
Big data and automation tools help organizations fingerprint malicious online behavior.
Ciena Teacher Grant in Action
The AFCEA Educational Foundation was thrilled to receive photos highlighting how Melissa Blair Tracy, Odyssey Charter School, Wilmington, Delaware, used her Ciena Teacher Grant to promote STEM learning.
Image
The Zero Trust Approach To Information Security For The Mobile Workforce: Sponsored Content
Modern Authentication Can Secure DoD Information for Excellence in Mission Execution
On Point: Q&A With Srini Iyer
Srini Iyer is the chief technology officer and head of ManTech’s Innovation & Capabilities Office.
Probing the Fragility of JADC2
The Defense Department’s vision of a totally connected networked force worries some experts.
Image
Cyber Warfare Begins With Military Precision
Educating small businesses and implementing workforce development is key to readiness.
Image
Mind the Cyber Gap
The U.S. information warfare approach must evolve to counter Chinese influence threats.
Image