navigation-background arrow-down-circle Reply Icon Show More Heart Delete Icon wiki-circle wiki-square wiki arrow-up-circle add-circle add-square add arrow-down arrow-left arrow-right arrow-up calendar-circle chat-bubble-2 chat-bubble check-circle check close contact-us credit-card drag menu email embed facebook-circle snapchat-circle facebook-square facebook faq-circle faq film gear google-circle google-square googleplus history home instagram-circle instagram-square instagram linkedin-circle linkedin-square linkedin load monitor Video Player Play Icon person pinterest-circle pinterest-square pinterest play readlist remove-circle remove-square remove search share share2 sign-out star trailer trash twitter-circle twitter-square twitter youtube-circle youtube-square youtube

Is the STEM shortage a national security issue?

Here's what I discovered after looking into the challenge involved in recruiting STEM resources.

Keeping up and getting ahead

Agility, creativity, innovation and adaptability are essential attributes for all those involved in…

Cyber should have a place in organizational structures

There is little doubt that cyber impacts military strategy, policy, decision-making, training, equip…

Communications: It's all about mobile data

Data must answer the call of duty.

CD is back in the news

Continued concerns about the use of a nuclear weapon and an increase in concern about the use of an…

Headlines

Is the STEM shortage a national security issue?

Here's what I discovered after looking into the challenge involved in recruiting STEM resources.

Keeping up and getting ahead

Agility, creativity, innovation and adaptability are essential attributes for all those involved in…

Cyber should have a place in organizational structures

There is little doubt that cyber impacts military strategy, policy, decision-making, training, equip…

Communications: It's all about mobile data

Data must answer the call of duty.

CD is back in the news

Continued concerns about the use of a nuclear weapon and an increase in concern about the use of an…

Surprise: Cyber presents serious environmental consequences

Too often cyber talk overlooks potential for devastating cascading effects.

Talk is cheap — what we need is more action

As Sen. John McCain said: “Threats to the United States in cyberspace continue to grow in scope and…

WikiLeak's CIA disclosure: Missing the real issue

It is difficult for me to understand why the ability to hack computers and devices and look and list…

House bill would allow companies to directly respond to cyberattacks

The U.S. House of Representatives has floated what is titled the “Active Cyber Defense Certainty Act…

The Pentagon's innovative approach and cyber implications

With so much taking place in the technology environment, the Department of Defense recently made a s…

DoD must act like a startup [Commentary]

Given the dynamics of the cyberthreat environment, we must change and adapt to this environment imme…

Our nation at risk: New and deeply concerning numbers

Are we moving ahead at a sufficient pace to adequately secure our sensitive military, intelligence a…

What we need is a cyber force multiplier [Commentary]

We must learn from the past, anticipate the future and concentrate on identifying what would be cons…

External cybersecurity integration a huge challenge

Protecting and defending the weakest in your connected environment is a much bigger challenge than m…

A global cyberwar on politics and government

All governments must take aggressive action to minimize cyberthreats and ensure the integrity of the…

Projected cyber issues for 2017

What are the significant cyber issues that the new administration is likely to face?

Editor's Picks

Naval lab selects 8 companies for $245M IT contract

Eight companies have been awarded a $245 million contract to provide IT services for the Naval Resea…

Inside the Coast Guard's IT transformation

Capt. David Dermanelian, C4IT Service Center director, has led a comprehensive effort to transform t…