Opinion

An array of perspectives and messages from thought leaders in the defense IT and C4ISRNET community.
How does use of ‘ninja missile’ change counterterrorism?
Drone strikes have also been relatively effective at limiting collateral damage compared to other strike options—reducing deaths among both civilians on the ground as well as U.S. servicemembers who might otherwise take part in a ground raid. Needless to say, a more precise missile will only serve to keep lowering civilian casualties.
The hypersonic race: A case for guarded optimism
All of these challenges are surmountable, but success demands careful consideration and smart execution. We cannot assume it will just happen. This hypersonic journey has been far from easy, but the threat environment demands we stay the course.
Why isn’t Russia doing more to jam GPS in Ukraine?
The importance of GPS as a military tool was underscored by Kremlin media in November 2021 as troops were massing along the Ukraine border. After Russia demonstrated it could destroy a satellite in space, a television commentator known to be an unofficial mouthpiece of President Putin said the nation could “blind NATO” by shooting down all GPS satellites.
Mission Possible: Securing remote access for classified networks
The Federal government understands the significance of remote access on meeting mission objectives now and in the future. Agency leaders are looking to the private sector for technology that helps them maintain the highest security levels while meeting the ease-of-access demands of today’s worker – and can be implemented quickly.
Six proven steps to Zero Trust
Agency leaders are working to adopt the mindset of trust nothing and verify everything to prioritize the transformation of legacy systems.
US must prepare for proliferation of cyber warfare
To build cyber resilience in this heightened threat environment, agencies must work closely with both international counterparts and industry to align on a proactive, global approach to all cyber threats –– not just state-sponsored attacks.
Using the 5Cs of fraud prevention in government programs
By detecting anomalies in data using advanced technologies such as artificial intelligence and machine learning, agencies are able to identify nefarious activity and stop it before more costly and malicious activity occurs. Actionable information extracted from data can also enable agencies to detect and prevent fraud before it happens.
To maximize cybersecurity dollars, lean on Zero Trust
Getting quickly to a Zero Trust architecture is more important than ever. Implementing C2C is a means available now to continuously identify and control access for all endpoints connecting to the network, making a comprehensive Zero Trust architecture achievable.
Cyberattacks don’t win wars
One of the key lessons from the Russian invasion of Ukraine for other militaries is to not abandon land-maneuvering capabilities in favor of investing too much in technology. Both abilities are needed, but not at the expense of one or the other.
How to put the joint in JADC2
As DoD continues to advance JADC2, it must contend with how to create a truly joint approach while avoiding the pitfalls of past attempts at joint systems.
Why has Russia’s emerging tech had so little impact on its invasion of Ukraine?
There is still a possibility that the Kremlin will begin to leverage more advanced technologies in the future. Russia’s military already possess these capabilities, ranging from unmanned ground vehicles previously used in Syria to tactical and loitering UAVs which will arm Russian commanders with clearer battlefield situational awareness and hypersonic missiles.
Washington must do more to support companies facing Russian hackers
Moscow has repeatedly demonstrated that its hackers — which include military and intelligence cyber units as well as “independent” proxies — have the capability to inflict untold damages on the infrastructure and companies the global economy depends upon.
Load More