:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/N4WADPNY2RA67GCVV6YOBITXJ4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/N4WADPNY2RA67GCVV6YOBITXJ4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/QOP3SLUKUBBGZCGARKEI65PZNQ.jpg)
Opinion
The challenge of adding governance as a pillar of cybersecurity
The new framework expands past critical infrastructure and reflects a structure for all organizations, no matter size, industry or region.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2XEKK3OKY5B3NJUDFYAR3N4IGY.jpg)
Opinion
The case for LEO satellite connectivity in $50 billion EIS contract
The contracting vehicle is designed to enable federal agencies to procure mission-critical telecommunications, infrastructure and technology services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YCG4LXLO2NBWZBMCM33HOUVR54.jpg)
Opinion
5 steps to better artificial intelligence procurement
Over the past 75 years or so, we have come simply to accept that policy lags technology.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I4SJKVGUTRHXZN7NSNHUW4H2LQ.jpg)
Opinion
Here’s the counter-drone platforms now deployed in Ukraine
Both Ukraine and Russia have used relatively inexpensive UAS to destroy multi-million-dollar tanks, air defenses, helicopters and aircraft.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/JAZVQVP4JFF5FJRP3I2YB5BN3A.jpg)
Opinion
The ‘Replicator’ dilemma: When mass isn’t enough
The Pentagon should match its big investment in attritable autonomy with smarter targeting, the author argues.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VVXGCSWYQJB4PNB5UJWHDJS7ZE.jpg)
Opinion
Changing video bit rate on the fly can boost the effectivness of ISR
The video-based intelligence provided by ISR platforms is critical to the situational awareness and effective decision-making needed for mission success.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MEAU4AMNSRENFJH6YR5RND6DH4.jpg)
Opinion
Unmanned systems are only as capable as their networks
The current discussion on the use of drones and robotic unmanned systems tends to overlook the pressing challenges of their connectivity.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HKLL27XGYJAL7NK3OGUXD3Q7XQ.jpg)
Opinion
We need hard laws on military use of AI — and soon
Is pushback by China, Russia and India insurmountable?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3T5S7VUYCRDQVEDJ4M6TLM3CDM.jpg)
Opinion
Is the Army moving too fast on drone adoption?
Skipping any one of these steps, whether it be driver-assisted technology, mapping or data collection, is tantamount to "acquisition malpractice."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
For the federal government, Zero Trust is just the beginning
Zero Trust has been top-of-mind for the Department of Defense for some time now, as evidenced by the aggressive strategy unveiled by the agency.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FV7VONEIEVBMDEYH5U7L53UPGE.jpg)
Opinion
How agencies can bolster cyber infiltration, ‘exfiltration’ defenses
Exfiltration can manifest itself in an accidental or intentional disclosure of internal data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5H273YSWZBFKHJ5MBMOPKEDS5I.jpg)
Opinion
Following the roadmap to open-source software security
It’s up to oversight bodies such as CISA, government leaders and industry partners to set baseline expectations for OSS use and ensure security.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/NVJMUECHLNFSZM2FBHFW4V24SM.png)
Opinion
For survivable resupply, look to autonomous submarines
With the possibility of a Chinese invasion of Taiwan, the U.S. Navy and Merchant Marine should examine using UAVs to to prevent a blockade.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XBUIO3AFBNE7NFJKLRZ4ZSMBU4.jpg)
Opinion
Zero hour for Zero Trust: How data tagging can speed implementation
Currently, agencies take their own unique approaches to the data discovery process, the authors say.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I7GULYZYDREYBIJNENHP2ET2QE.jpg)
Opinion
The US just got serious about cybersecurity. Contractors aren’t ready.
In many cases, companies that hold intelligence aren’t aware of their own role in national security, the author argues.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VTTFCHWPJBESBFPV7OBIRUIHWQ.jpg)
Opinion
How arming Saudi Arabia helped Israel and the United States
The more Saudi Arabia can intercept missiles and drones headed north from Yemen, the less effort Israel will have to spend on defeating those attacks.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WID7CWZZTREGDNRPBP6TDLTUJY.jpg)
Opinion
How US can get and stay ahead of adversaries on intelligence data
Data is playing an increasingly critical role in intelligence community operations and mission support.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)