:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6UBD4UI2DJBU5LXBCALCTKLAX4.jpg)
Three keys to standing up the Army’s Modernization Command [Commentary]
As the Army stands up the Modernization Command, it faces some daunting, yet addressable challenges. Here are the big obstacles they need to overcome.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FGC3AKRHBJC33D732254EP4QT4.jpg)
Net Defense Blogs
Solving the challenges of change [Commentary]
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MOPNUPLEL5CQFOBQYSAXW3MAPM.jpg)
Surprise: Cyber presents serious environmental consequences
Too often cyber talk overlooks potential for devastating cascading effects.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FMQR3L44CBCIDFHVTDL5243CLY.jpg)
Talk is cheap — what we need is more action
As Sen. John McCain said: “Threats to the United States in cyberspace continue to grow in scope and severity. But our nation remains woefully unprepared to address these threats, which will be a defining feature of 21st century warfare.”
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FL6MK3ENTZCTJMJCOQ2N3CFENA.jpg)
WikiLeak's CIA disclosure: Missing the real issue
It is difficult for me to understand why the ability to hack computers and devices and look and listen in is a shock to anyone.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YTVLAEMYSVDNBKOLWX4OVWHERM.jpg)
House bill would allow companies to directly respond to cyberattacks
The U.S. House of Representatives has floated what is titled the “Active Cyber Defense Certainty Act,” which basically allows companies experiencing a cyberattack to hack back.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KNFVLNP4NFCNBL6OLTBZUGFKWM.jpg)
The Pentagon's innovative approach and cyber implications
With so much taking place in the technology environment, the Department of Defense recently made a strategic move to more aggressively pursue the capabilities and solutions these emerging technologies offer.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AKEDDZBS5BG33EIAJ6HHU45DAI.jpg)
DoD must act like a startup [Commentary]
Given the dynamics of the cyberthreat environment, we must change and adapt to this environment immediately — or risk failing and falling behind. Perhaps part of the answer to this issue is for the defense and intelligence organization and industry players to think of themselves and more importantly act like a startup!
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6VSRRBT7HZABLIZEPBIRIFKQ5M.jpg)
Our nation at risk: New and deeply concerning numbers
Are we moving ahead at a sufficient pace to adequately secure our sensitive military, intelligence and government systems, as well as our critical infrastructure?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WZSYZKR35JDG5AIU5XWG2XGNLM.jpg)
What we need is a cyber force multiplier [Commentary]
We must learn from the past, anticipate the future and concentrate on identifying what would be considered a force multiplier in cyberspace.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/S5J6KX7JSFCA5DPKJJPYCDIZ4Q.jpg)
External cybersecurity integration a huge challenge
Protecting and defending the weakest in your connected environment is a much bigger challenge than many realize.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HITQTWFTPJFJFEMVQPBKKGRGK4.jpg)