:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2LIV7MJJBJGBJOOJW4YJYGIXG4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2LIV7MJJBJGBJOOJW4YJYGIXG4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/B2PX4UF3ARDGVNQBLNMHJR6HT4.jpg)
Australia’s CI-ISAC takes whole-of-nation approach to cybersecurity
Cyber threats span all sectors and a more holistic approach to sharing information on cyber threats and attacks is required.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TQJYZPARZZBIZHTEVVR23S2NGE.jpg)
Opinion
A better bridge across the ‘valley of death’
As the Pentagon’s Small Business Strategy makes clear, small companies are key to helping the U.S. ensure its technological superiority.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/JQPXEMGO5ZGMPNKXZ6VDMXT7BE.jpg)
An organizational road map for Pentagon to deter China, win in Ukraine
The Pentagon is woefully unprepared to integrate commercial technologies and private capital at scale.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/RC47Z2KI6JFPTAVUK7SLXMVEWQ.jpg)
Comply-to-Connect: The roadmap for the Pentagon’s Zero Trust mission
C2C leverages zero trust’s least privilege principles to safeguard access to data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WRRPQ4SIYFBFVIGU6LB6HF7FCI.jpg)
Sea power is essential to countering communist China
China is on a fast track to displace America as the world’s dominant naval power.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SYKKRKRAE5DEHIWOBHYTW4RLNI.jpg)
How to ensure Iranian drones don’t include US components
While the Iranian drone threat may have previously seemed distant for Europe, the appearance of these weapons in Ukraine has brought the problem home.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WBTSLREOY5ER7KEUW5BJIK46PY.jpg)
The impact of ChatGPT on the federal workforce
Amid all the excitement, there are concerns that ChatGPT and other LLM tools could eliminate jobs, provide inaccurate information and perpetuate bias.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Defense contractors must prepare for ‘trust but verify’ era
The upcoming contract requirement known as the DFARS 7021 clause adds a “trust but verify component” to existing federal contract data protection.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YEHE4JUZJNAVBGLTMTFC5UKKAQ.jpg)
What difference will Polish, Slovakian fighter jets make to Ukraine?
Other NATO allies will now be under increased pressure to offer Ukraine their own, Western-designed aircraft.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5H273YSWZBFKHJ5MBMOPKEDS5I.jpg)
National Cybersecurity Strategy is a North Star for federal agencies
Many government agencies still rely on legacy IT systems that are costly to maintain and difficult to defend, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6QSHJUIGAJDAJNC3SGKXZPFEVU.jpg)
Biden, Trudeau must expand binational action to bolster cybersecurity
Biden’s visit to Canada to meet with Prime Minister Justin Trudeau this week will be an opportunity to expand on cybersecurity cooperation.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DAE4N5KLV5DYJHXHV66WCQKJTY.jpg)