:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VKFRD4Q64FC6BFA3WKY2KZUZCA.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VKFRD4Q64FC6BFA3WKY2KZUZCA.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
Cyber attacks reveal uncomfortable truths about US defenses
It should be recognized that cybersecurity systems can be just as flawed as the systems they protect, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3T6LCSAGJFAJ5ISIYQZSMIWBC4.jpg)
Opinion
How to optimize Internet of Things security while promoting innovation
The Federal Communications Commission is seeking public comments on the proposed cybersecurity labeling program.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OTQXWB3RHZHNJOKBFONGNLUZIY.jpg)
Opinion
Cloud computing’s balancing act: Are we in a mushroom cloud moment?
In many ways, the computing cloud is the cyber version of the Trinity mushroom cloud.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXVEBXUARBGVJE2GRVS67H22SU.jpg)
Texas Guardsmen spied on migrants via WhatsApp, mishandled secret docs
An investigation by Military Times and The Texas Tribune charts the rise and fall of a military intelligence directorate gone rogue on the border.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AENNUCWM7ZAC3OXTSACE6QWAAY.jpg)
Opinion
Pentagon must close technology gap, get AI right to win on battlefield
A former deputy chief of staff to then-Defense Secretary Jim Mattis says U.S. squad leaders deserve the best technology.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FR55XVRFZNCZ5OOV66E2T5IXBE.jpg)
How to protect critical infrastructure in the quantum-computing era
Attacks involving operational technology, or OT, could result in injury, illness or worse across cities or regions.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/W5UL4LPPIZEEBAFW2JXJGLYS4M.jpg)
Troops need improved cyber education, US Army leaders say
Failing "to defend the networks that our warfighters use absolutely will cause us to lose,” said Lt. Gen. Maria Barrett, the ARCYBER commander.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MYLE76HVHJARNDLOR62HJMAQEU.jpg)
Opinion
The time is now to go all in on modernizing weapon systems
Just as kinetic capabilities are crucial to success on the ground, so too is data crucial to operational success in cyberspace.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/UGRMT5L5N5B6ZIRMDSGDA3WW7U.jpg)
Opinion
Why the China cyber threat demands an airtight public-private response
CISA’s Shields Up program was launched in 2022 to foster information sharing about cybersecurity threats, products, and other resources.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MTKA27AIINAKRL5TZMU7SW7MNA.jpg)
Emerging tech-focused firms could reshape the Top 100
Programs like hypersonics "are tailor-made for mid-tier and technology-oriented” firms expert Alan Chvotkin said. “I see opportunity there for growth."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
Six steps to safeguarding government software amid rising threats
The recent global cyber-attack targeting MOVEit federal software serves as a vivid reminder of the potential consequences.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7EM2PMUTYJEGVJZUU2OP5LXFDA.jpg)