Not finding what you’re looking for?
Planning for Surprise Permits DHS Pandemic Pivot
Sometimes scientists are the first responders.
Image
The Navy Goes Parallel With New Digital Capabilities
Vital aspects of system development and deployment are performed concurrently.
Image
Disruptive by Design: Managing Signatures for Expeditionary Advanced Base Ops
As a way to provide sea denial in support of naval operations, expeditionary advanced base operations are the Marine Corps’ bid for success in disrupting the fait accompli strategies of great power competitors. While highly promising, this concept possesses a critical vulnerability: signature management.
Security in the Cloud Requires Zero Trust Architecture: Sponsored Content
The cyber attack surface will expand as the remote workforce and the tools they use become new vectors for adversaries.
Preparing for JEDI
The Defense Department is moving forward with preparations for an enterprise tactical cloud, says the DOD’s top information officer.
Image
A Cyber Thread Runs Through Government Future Assessments
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.
Image
Weaponizing Automation Protects Cyber Systems
Unifying the military’s information network management would streamline defense protections.
Image
Zeroizing Network Shrinks Attack Surfaces
With pure dataflow, hackers can be defeated.
Image
Current Threats Require Multifactor Protection
Organizations can’t rely on two-factor identification verification against sophisticated adversaries.
Image
The Pandemic Heightens the Need for Cybersecurity
Experts share their observations of the cybersecurity landscape in such an unusual time.
Image