navigation-background arrow-down-circle Reply Icon Show More Heart Delete Icon wiki-circle wiki-square wiki arrow-up-circle add-circle add-square add arrow-down arrow-left arrow-right arrow-up calendar-circle chat-bubble-2 chat-bubble check-circle check close contact-us credit-card drag menu email embed facebook-circle snapchat-circle facebook-square facebook faq-circle faq film gear google-circle google-square googleplus history home instagram-circle instagram-square instagram linkedin-circle linkedin-square linkedin load monitor Video Player Play Icon person pinterest-circle pinterest-square pinterest play readlist remove-circle remove-square remove search share share2 sign-out star trailer trash twitter-circle twitter-square twitter youtube-circle youtube-square youtube

A change to the cyberthreat

How do you make decisions when you do not know what data is real and what data has been manipulated?

Filling the cybersecurity void

Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be t…

Outdated organizational structure?

There is little doubt that cyber impacts military strategy, policy, decision-making, training, equip…

DoD must act like a startup

Perhaps part of the answer to addressing the cyberthreat environment is for the defense and intellig…

Changing cyber access on state and local levels

Receiving sensitive and sometimes classified cyber intelligence is critical to addressing the growin…

Headlines

A change to the cyberthreat

How do you make decisions when you do not know what data is real and what data has been manipulated?

Filling the cybersecurity void

Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be t…

Outdated organizational structure?

There is little doubt that cyber impacts military strategy, policy, decision-making, training, equip…

DoD must act like a startup

Perhaps part of the answer to addressing the cyberthreat environment is for the defense and intellig…

Changing cyber access on state and local levels

Receiving sensitive and sometimes classified cyber intelligence is critical to addressing the growin…

Streamlining national security decisions

Will our decision-making process around national security be streamlined? If so, there must be balan…

Is the STEM shortage a national security issue?

Here's what I discovered after looking into the challenge involved in recruiting STEM resources.

Keeping up and getting ahead

Agility, creativity, innovation and adaptability are essential attributes for all those involved in…

Cyber should have a place in organizational structures

There is little doubt that cyber impacts military strategy, policy, decision-making, training, equip…

Surprise: Cyber presents serious environmental consequences

Too often cyber talk overlooks potential for devastating cascading effects.

Communications: It's all about mobile data

Data must answer the call of duty.

CD is back in the news

Continued concerns about the use of a nuclear weapon and an increase in concern about the use of an…

Talk is cheap — what we need is more action

As Sen. John McCain said: “Threats to the United States in cyberspace continue to grow in scope and…

WikiLeak's CIA disclosure: Missing the real issue

It is difficult for me to understand why the ability to hack computers and devices and look and list…

House bill would allow companies to directly respond to cyberattacks

The U.S. House of Representatives has floated what is titled the “Active Cyber Defense Certainty Act…

The Pentagon's innovative approach and cyber implications

With so much taking place in the technology environment, the Department of Defense recently made a s…

Editor's Picks

Naval lab selects 8 companies for $245M IT contract

Eight companies have been awarded a $245 million contract to provide IT services for the Naval Resea…

Inside the Coast Guard's IT transformation

Capt. David Dermanelian, C4IT Service Center director, has led a comprehensive effort to transform t…