:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/IOFHPIO6OBBNHJ6UGR6YS2RPMU.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/IOFHPIO6OBBNHJ6UGR6YS2RPMU.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7POBSQMXBFGBLDJHIZTNRCAGFU.jpg)
Opinion
The digital engineering accelerators powering the Army’s modernization
DE has assumed a central role in Army innovation, helping propel the operating forces into a new era of readiness.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/D4ZJIEJ57ND2JLJL4JRIFSL6DI.jpg)
Opinion
DISARMing cyber threats with ATT&CK: A winning combination
As this framework gains recognition, it holds the potential to evolve into a universal language for identifying and countering influence, the authors say.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MLA6RKS2UJDHZAXLK2G3HHKJAY.jpg)
Opinion
Space Force can bolster Greenland ties by buying local for Arctic base
A first step is to abide by international agreements and U.S. law would be for the service to procure supplies from Greenlandic companies, the authors say.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EL3ICO5OZ5CGHELDNJMNAXT2BI.jpg)
Opinion
How the Pentagon can better deploy the data it collects as a weapon
The military should leverage a relatively untapped resource: the onboard data generated by weapon systems, aircraft, maritime vessels and other assets.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SZN6B2QQLJB2BPNUWP4AGY2AXM.jpg)
Opinion
How automated tagging helps mission teams securely share information
Data-centric security safeguards information regardless of where it’s located or who it’s shared with, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4S34ZXAPNZH7FAT2FF4KGE4N2Y.jpg)
Opinion
To stay competitive, US military complex must hurdle ‘Valley of Death’
The U.S. is in its decisive decade for competition with China, and technology is the primary arena for the rivalry.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/B7BKA3LYCRGUPBOBZQPNDVAC74.jpg)
Opinion
Military superiority demands artificial intelligence proficiency
Overcoming negative narratives can be hard, especially as it applies to artificial intelligence.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3DQ225KJBJGGLI7XK5BYBZ3GKE.jpg)
Opinion
In the pipeline: The impact of TSA cybersecurity directives
Continuous monitoring provides real-time visibility into anomalous activities, unauthorized access attempts and potential threats, the author argues.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/P32GRDERAFAOVHCVST6EED34G4.jpg)
Opinion
Deterrence in space requires more than SilentBarker’s eyes
If the U.S. is serious about deterrence in space, it must be serious about building the war-winning space forces capable of achieving space superiority.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DBMZCSZZFFDELGIIM5D6ZABRFE.jpg)
Opinion
What commercial autonomous technology can do for US Army modernization
The Pentagon is at an important juncture as it thinks creatively and ambitiously on how to leverage this critical new technology.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
Cyber attacks reveal uncomfortable truths about US defenses
It should be recognized that cybersecurity systems can be just as flawed as the systems they protect, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3T6LCSAGJFAJ5ISIYQZSMIWBC4.jpg)
Opinion
How to optimize Internet of Things security while promoting innovation
The Federal Communications Commission is seeking public comments on the proposed cybersecurity labeling program.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LWRPQJMAWFC6RCQR5JE2HOU5VI.jpg)
Opinion
How to ensure the defense-industrial base and supply chain resiliency
Here are several recommendations for actionable policies that could contribute to the long-term health and resiliency of the industrial base.
:quality(70):focal(3099x2297:3109x2307)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5FCGSXQKBZBPLGXC32VMGTZ66Y.jpg)
Opinion
DJI isn’t the only Chinese drone threat to US security. Meet Autel.
Here is what the Biden administration and Congress must do to secure U.S. critical infrastructure and the American people.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/JAZVQVP4JFF5FJRP3I2YB5BN3A.jpg)
Opinion
Army of coders needed to make Replicator drone initiative a success
The program should be the first to acknowledge that both software and data production need to be core military competencies, the authors argue.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DEUKVU4BYBCYDC5PG3A4RZRCJM.jpg)
Opinion
US seizes initiative on space security for the first time in decades
The world is on Washington’s side to help make space more secure and sustainable, if only it has the political will to lead.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
How to protect critical infrastructure and ensure mission readiness
Organizations – especially critical infrastructure organizations – are under siege in cyberspace daily.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Z6EZVYFTBNGWDO27LRU3BMKHPI.jpg)