:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/6UBD4UI2DJBU5LXBCALCTKLAX4.jpg)
Three keys to standing up the Army’s Modernization Command [Commentary]
As the Army stands up the Modernization Command, it faces some daunting, yet addressable challenges. Here are the big obstacles they need to overcome.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/XV5CZCGGT5EPDHTUVCJTDJHIAE.jpg)
The Compass
Cyberwar's battlefield: The commercial sector [Commentary]
The coordinated and pervasive grand strategy of our adversaries is a confounding and mortal danger to the U.S.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/FGC3AKRHBJC33D732254EP4QT4.jpg)
Solving the challenges of change [Commentary]
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/QEBUL2XEWFG4JIFM5C22CY5T64.jpg)
The FY18 Defense Authorization and insider threat [Commentary]
As the fiscal 2018 NDAA winds its way through Congress, it is worth noting how differently the House and Senate are treating matters related to reducing threats from insiders.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/MOQVIPWBSVG3DJ7KOAHALGSF74.jpg)
The challenge of digitization and technological advancement
Familiarization with technology promotes a level of comfort that is difficult to achieve with those that did not grow up with the internet.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/3P7TUUOJ2JD77CDF6PGL4C5B7Q.jpg)
Getting — and staying — one step ahead
Are existing policies and regulations impeding our military’s and intelligence community’s ability to respond and react in a near-real time manner that is a fundamental requirement today?
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/SFMCQNE7MNHIFBH5VQZTMSPZAQ.jpg)
A ‘cyberwar’ definition remains problematic
There are many complicated questions posed while defining the cyberwar battlefront.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/7OZ4YZQ3HVHRXPIFE4HS4T4I4I.jpg)
The case for the software-defined battlefield
After more than 15 years of nearly constant deployments, the U.S. military’s balancing act between modernization and readiness is reaching a tipping point.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/PCFCUIUZQ5DDLHQLDH64EAXRUA.jpg)
The issue of singularity
Multiple technologies are emerging that individually will change multiple aspects of military operations. That is one of the areas where the issue of singularity becomes much more acute.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/JNVQ6LNFYZEDLPJ4L6W3RG735I.jpg)
The business of national cybersecurity
With all the attention over cyberthreats, one would think the business of national cybersecurity would be very robust. Well, that depends who you talk to.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/R4FRG3DUSNGOLA3FXK6NAVTJLQ.jpg)
Cyber training and education must be continuous [Commentary]
Considering the pace with which technology is advancing and implemented, it is easy to see just how essential continuing educations has become.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/7W7DLSPMYBDERJB2KD3NDTLYNQ.jpg)
The weird science of quantum computing, communications and encryption
Quantum theory is the abstract basis of modern physics. It explains the nature and behavior of how matter acts.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/FCO5M35D6NEOBADPYM4XJ7CRM4.jpg)
Cryptocurrencies — a growing issue for military, intel agencies and law enforcement
While many have not heard of or understand cryptocurrencies, you had better take notice — that is for sure! This is a powerful technology whose ramifications mandate that military, intelligence organizations and law enforcement must monitor and understand it.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/5K7XSP2KGJBAXCSPQMWCIB7X7Y.jpg)
The weaponization of words and conversations
The connected world in which we live has transformed words and conversations into weapons.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/ZOLWYTSOMNF65OSHITM4TLW3SQ.jpg)
The complexity of developing a cyber defense strategy
For decades, our adversaries have been and continue to constantly seek new ways to compete with the United States on a much more level battlefield. Cyber has much, if not all, of what they have been looking for.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/SFMCQNE7MNHIFBH5VQZTMSPZAQ.jpg)
WannaCry: Top 5 lessons learned
The WannaCry ransomware brought with it some unexpected consequences.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/AREGRDTSOBAXHP7PMPG7GW3HKI.jpg)
Cyber, biological, crypto: Hybrid terrorism at work
The move to May brought with it a terrorist incident that is likely to resemble an increasing percentage of incidents in the coming years.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/KPJYAHGYLVB5LNYJWDWFPVCGDY.jpg)
A change to the cyberthreat
How do you make decisions when you do not know what data is real and what data has been manipulated?
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/V3P54H5A6RG5RONAN42FIJL45E.jpg)
Filling the cybersecurity void
Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be the dominant differentiation for new entrants in the cybersecurity field.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/7EQQNKXC4NGWXCHWFYZN7UXTWY.jpg)
Outdated organizational structure?
There is little doubt that cyber impacts military strategy, policy, decision-making, training, equipment/weapons, as well as organizational operations. Given the magnitude of impact, it should be addressed organizationally.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/ZGMWGIUWNNB7VEA5XVTBNZPCDY.jpg)
DoD must act like a startup
Perhaps part of the answer to addressing the cyberthreat environment is for the defense and intelligence organizations and industry players to think and act like a startup.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/IAIZSHNNNFC2RMIIRQ6WJ3CD7I.jpg)
Changing cyber access on state and local levels
Receiving sensitive and sometimes classified cyber intelligence is critical to addressing the growing cyberthreats that target state and local government systems.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/BTXVSVYMCVAMTKNKH7ZEQZJCO4.jpg)
Streamlining national security decisions
Will our decision-making process around national security be streamlined? If so, there must be balance between speed and making sure we are right.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/6HMMXCCYQNBQJOM7E3YY6NSKYY.jpg)
Is the STEM shortage a national security issue?
Here's what I discovered after looking into the challenge involved in recruiting STEM resources.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/LVY544RYLFF6DDJAXAS6E4JMCI.jpg)
Keeping up and getting ahead
Agility, creativity, innovation and adaptability are essential attributes for all those involved in security, defense and intelligence.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/6OIHPXURIZBVZL5ES7KCNQSWNU.jpg)
Cyber should have a place in organizational structures
There is little doubt that cyber impacts military strategy, policy, decision-making, training, equipment/weapons and organizational operations. Given the magnitude of impact, it should be organizationally addressed.
:quality(70)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/SU4XASYOJBER5KXZLDFTQRM3HM.jpg)