Opinion

An array of perspectives and messages from thought leaders in the defense IT and C4ISRNET community.
US must prepare for proliferation of cyber warfare
To build cyber resilience in this heightened threat environment, agencies must work closely with both international counterparts and industry to align on a proactive, global approach to all cyber threats –– not just state-sponsored attacks.
Using the 5Cs of fraud prevention in government programs
By detecting anomalies in data using advanced technologies such as artificial intelligence and machine learning, agencies are able to identify nefarious activity and stop it before more costly and malicious activity occurs. Actionable information extracted from data can also enable agencies to detect and prevent fraud before it happens.
To maximize cybersecurity dollars, lean on Zero Trust
Getting quickly to a Zero Trust architecture is more important than ever. Implementing C2C is a means available now to continuously identify and control access for all endpoints connecting to the network, making a comprehensive Zero Trust architecture achievable.
Cyberattacks don’t win wars
One of the key lessons from the Russian invasion of Ukraine for other militaries is to not abandon land-maneuvering capabilities in favor of investing too much in technology. Both abilities are needed, but not at the expense of one or the other.
How to put the joint in JADC2
As DoD continues to advance JADC2, it must contend with how to create a truly joint approach while avoiding the pitfalls of past attempts at joint systems.
Why has Russia’s emerging tech had so little impact on its invasion of Ukraine?
There is still a possibility that the Kremlin will begin to leverage more advanced technologies in the future. Russia’s military already possess these capabilities, ranging from unmanned ground vehicles previously used in Syria to tactical and loitering UAVs which will arm Russian commanders with clearer battlefield situational awareness and hypersonic missiles.
Washington must do more to support companies facing Russian hackers
Moscow has repeatedly demonstrated that its hackers — which include military and intelligence cyber units as well as “independent” proxies — have the capability to inflict untold damages on the infrastructure and companies the global economy depends upon.
Data transport will decide the next conflict, not hypersonics
As the U.S. and allied defense community evaluate where to focus development and problem-solving resources, it’s important to ask what will deliver the strategic advantage needed in modern warfare.The battlespace has changed, and future conflicts will be fought — and won — differently in the next 30 years than they were in the past.
Cross-Domain Technologies Are the Key to JADC2
JADC2 aims to build a cross-service digital architecture that can enable rapid and precise data exchanges across domains in order to improve decision-making at the strategic, operational and tactical edges of war fighting.
Demilitarize civilian cyber defense, and you’ll gain deterrence
By constantly flexing the military’s cyber muscles to defend the homeland from inbound criminal cyber activity, the public demand for a broad federal response to illegal cyber activity is satisfied. Still, over time, the potential adversary will understand our military’s offensive cyber operations’ tactics, techniques and procedures.
Artificial intelligence brain circuit board
The role of AI in open source intelligence
Today’s AI-enabled platforms empower intelligence analysts to leverage OSINT as the foundation that can help uncover hidden threats, corroborate classified reporting, and pinpoint the targets that warrant resource-intensive, traditional intelligence gathering.
Load More