:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MLFYUBX6URB6DK6WC22CU3JXVE.jpg)
Thought Leadership
Is 2023 the year you become a government contractor?
The federal government spent around $637 billion on contracts in fiscal year 2022, including those covering professional support services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
Software Bill of Materials is the key to cybersecurity compliance
SBOMs can be a valuable tool to identify and address potential security challenges.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I3LF2EEUXJAZDLYBYG74FTPTCQ.jpg)
US foreign military sales process needs better communication
Allied nations often don’t know what they need to solve their problem or what the U.S. has to offer.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/UKHBF5ELIBBQJBVHXGEUYNQSII.jpg)
Pentagon must act now on quantum computing or be eclipsed by rivals
The battle for quantum supremacy is already under way, and is set to fundamentally change the defense sector .
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HTO5HQZJZFVRBLBUUFX55DGUU.jpg)
Three ways to build on DISA’s strong data strategy
DISA’s IPlan is a solid step forward for guiding internal data practices, providing insights and goals to reduce data silos.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/W5RQAJKONZAQJA5ASS6PHDMY3Q.jpg)
More can be done to ban US government use of Chinese drones
The U.S. national security community must eschew companies and supply chains controlled by the Chinese Communist Party.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5NPKFVEN3VHCZEGMUYHDZQMGNI.jpg)
How big of a fleet? A look at the US Navy’s size and readiness needs
Absent the personnel and support needed, additional ships could spend more time at the piers and be less capable at sea.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7DGID34ZMFG6HBBRLE7NR5MD2Y.jpg)
US can strengthen security by developing domestic rare earth resources
In the long term, the status quo around critical materials is unacceptable since it gives China a “kill switch” for America’s defense manufacturing.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PLLR4FOEABA4HKU6C2ZRVGHNGA.jpg)
Washington is waking up on weapons for Taiwan
The legislation includes much-needed guidance to the U.S. Defense and State Departments to prioritize the delivery of arms to Taiwan.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4MW46AVAD5HMHBTZZ6H3VOTH3Y.jpg)
Pentagon’s Office of Strategic Capital must win over Silicon Valley
The U.S. is doubling down on industrial goals, aiming to increase its role in the national security ecosystem and diminish that of its competitors.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HU66P6LCNZDQTDP6X26I7GPHDI.jpg)
An open call to the visionaries in government to change DoD culture
Are we willing to let go of the culture and policies that stifle significant progress in advancing military capability?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VHTMTOG22JDBDBFDP36XJ4PD7I.jpg)
White House AI ‘Bill of Rights’ may risk national security
Privacy-Preserving Machine Learning may address core concerns of the blueprint without slowing the pace of U.S. innovation
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MFAKL5RQIVBQVJV6Z2E4IYYNCA.jpg)
Mine it in America — Securing the US military supply chain
Every F-35 strike fighter built for U.S. armed forces contains 920 pounds of rare earth materials — the majority of which is imported from China.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KXUXS7WQ6NHRPA4TKJRO44SF3A.jpg)
How Model-Based Systems Engineering can speed military modernization
A subset of digital engineering, MBSE uses models, computer design, analytics and software to create digital twins of prototypes quickly and efficiently.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AENNUCWM7ZAC3OXTSACE6QWAAY.jpg)
Information superiority and the race for global AI leadership
The Pentagon is pursuing a third offset strategy — one that puts Artificial Intelligence at the forefront of U.S. defense policy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VW2CHRPCKFEURKLMHKPUI2W63M.jpg)