Not finding what you’re looking for?
NSF Project Gathers Hyper-Localized COVID Data
Behaviors near medical centers may inform policies.
Image

Planning for Surprise Permits DHS Pandemic Pivot
Sometimes scientists are the first responders.
Image

The Navy Goes Parallel With New Digital Capabilities
Vital aspects of system development and deployment are performed concurrently.
Image

Disruptive by Design: Managing Signatures for Expeditionary Advanced Base Ops
As a way to provide sea denial in support of naval operations, expeditionary advanced base operations are the Marine Corps’ bid for success in disrupting the fait accompli strategies of great power competitors. While highly promising, this concept possesses a critical vulnerability: signature management.
Security in the Cloud Requires Zero Trust Architecture: Sponsored Content
The cyber attack surface will expand as the remote workforce and the tools they use become new vectors for adversaries.
Preparing for JEDI
The Defense Department is moving forward with preparations for an enterprise tactical cloud, says the DOD’s top information officer.
Image

A Cyber Thread Runs Through Government Future Assessments
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.
Image

Weaponizing Automation Protects Cyber Systems
Unifying the military’s information network management would streamline defense protections.
Image

Zeroizing Network Shrinks Attack Surfaces
With pure dataflow, hackers can be defeated.
Image

Current Threats Require Multifactor Protection
Organizations can’t rely on two-factor identification verification against sophisticated adversaries.
Image
