:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6UBD4UI2DJBU5LXBCALCTKLAX4.jpg)
Three keys to standing up the Army’s Modernization Command [Commentary]
As the Army stands up the Modernization Command, it faces some daunting, yet addressable challenges. Here are the big obstacles they need to overcome.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FGC3AKRHBJC33D732254EP4QT4.jpg)
Net Defense Blogs
Solving the challenges of change [Commentary]
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/V3P54H5A6RG5RONAN42FIJL45E.jpg)
Filling the cybersecurity void
Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be the dominant differentiation for new entrants in the cybersecurity field.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7EQQNKXC4NGWXCHWFYZN7UXTWY.jpg)
Outdated organizational structure?
There is little doubt that cyber impacts military strategy, policy, decision-making, training, equipment/weapons, as well as organizational operations. Given the magnitude of impact, it should be addressed organizationally.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZGMWGIUWNNB7VEA5XVTBNZPCDY.jpg)
DoD must act like a startup
Perhaps part of the answer to addressing the cyberthreat environment is for the defense and intelligence organizations and industry players to think and act like a startup.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/IAIZSHNNNFC2RMIIRQ6WJ3CD7I.jpg)
Changing cyber access on state and local levels
Receiving sensitive and sometimes classified cyber intelligence is critical to addressing the growing cyberthreats that target state and local government systems.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BTXVSVYMCVAMTKNKH7ZEQZJCO4.jpg)
Streamlining national security decisions
Will our decision-making process around national security be streamlined? If so, there must be balance between speed and making sure we are right.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6HMMXCCYQNBQJOM7E3YY6NSKYY.jpg)
Is the STEM shortage a national security issue?
Here's what I discovered after looking into the challenge involved in recruiting STEM resources.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LVY544RYLFF6DDJAXAS6E4JMCI.jpg)
Keeping up and getting ahead
Agility, creativity, innovation and adaptability are essential attributes for all those involved in security, defense and intelligence.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6OIHPXURIZBVZL5ES7KCNQSWNU.jpg)
Cyber should have a place in organizational structures
There is little doubt that cyber impacts military strategy, policy, decision-making, training, equipment/weapons and organizational operations. Given the magnitude of impact, it should be organizationally addressed.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SU4XASYOJBER5KXZLDFTQRM3HM.jpg)
Communications: It's all about mobile data
Data must answer the call of duty.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/L2QUAXUSRNH5TIFBV7JR25W27Y.jpg)