:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/I4YVPCVGSJA6HKLE3QWL5QSPNM.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/I4YVPCVGSJA6HKLE3QWL5QSPNM.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/LGHRIJR7OZCFZMBUDWT5SVHPWQ.jpg)
Cross-Domain Technologies Are the Key to JADC2
JADC2 aims to build a cross-service digital architecture that can enable rapid and precise data exchanges across domains in order to improve decision-making at the strategic, operational and tactical edges of war fighting.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/VUJ7Y3WZKNEO7EM6KRAQBGHBYU.jpg)
Home
C4ISRNET announces keynote speakers for CyberCon 2021
Senior cybersecurity leaders from across the U.S. Department of Defense will discuss strategy, information warfare and emerging threats at the 7th annual CyberCon on Nov. 10.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/S2J5TKHYQ5BAJGBITKBFFMPG6A.jpg)
Big screen to battlefield: How sci-fi can inspire next-generation weaponry
Directed energy has captivated science fiction fans for decades, but we must not allow a failure of imagination to prevent us from converting directed energy from movie magic to military might before our adversaries.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/4XXZT47SVZEMRCOFXXADB76S4A.jpg)
You go to war with the data you have: next-generation AI for national security
The National Nuclear Security Administration has AI research that national security agencies to accelerate AI innovation and enable an AI-ready force, a project leader explains.
National security through telework: remote collaboration to protect the joint force
The first idea an Army officer recommends to reduce vulnerabilities is for the DoD to issue unclassified, government-funded laptops to each employee and provide them with a suite of collaboration software.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/QTKFMQST3BHXFC5BVKDUXGZJJI.jpg)
The Pentagon needs a plan to get punched in the mouth
A researcher explains how China and Russia channel boxer Mike Tyson through strategies that attack U.S. military information and command systems and exploit the resulting cognitive and psychological disruption.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/4642FWVY35AJTMC4CP6IE232WE.jpg)
It’s time to transform the DoD enterprise cloud to a war-fighting cloud
A critical moment has been reached in the modernization of the DoD, and a cloud that effectively supports war-fighting capabilities will be critical in maintaining a competitive advantage, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/YZBQXT7GXZHHHG7EHQBC6BZKOI.jpg)
‘Accelerate change or lose’: Applying Gen. Brown’s action orders to cyberspace education and training
The author proposes steps to correct a lack of adequate training for a large number of Air Force cyberspace personnel.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/YZBQXT7GXZHHHG7EHQBC6BZKOI.jpg)
Securing information age combat capabilities demands a new approach
The DoD should consider acquisition process changes to encourage technologies to help connect weapon systems across domains, the author proposes.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/LGHRIJR7OZCFZMBUDWT5SVHPWQ.jpg)
Transforming Command and Control — A Strategic Imperative for the Warfighter
Ultimately, investing in these efforts today will advance our ability to operate across all domains at speed — accelerating the “kill chain” and preserving our decision advantage.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/GU6B6WE77ZHI7GXOLF63NMBZUM.jpg)
Russia-Iran cooperation poses challenges for US cyber strategy, global norms
If Moscow and Tehran share intelligence about U.S. cyber operations, that would bring new challenges for U.S. Cyber Command and the DOD, experts explain.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/FQP36F7FOJAFJK6IPEU6G72UVI.jpg)
Politics should not determine location for US Space Command
A former U.S. senator says Air Force leaders have chosen command locations without the mission, war fighter and taxpayer in mind.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/SY7J6A2BH5ACZDPUZLELFFKBNU.png)
Closing the gap to win the AI marathon
Fortunately for the U.S., the race for AI superiority with China is not a sprint. An industry expert shares ideas for how Washington can come out ahead in the long run.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/YZBQXT7GXZHHHG7EHQBC6BZKOI.jpg)
AlphaDogfight should scare the Air Force straight … into scaling AI efforts
Two captains have ideas to help the Air Force accelerate its efforts to ready itself for the artificial intelligence revolution.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/GCAL2AIX2BEJJK3TMYLCARSZIM.jpg)
How the military can get more out of artificial intelligence
The authors argue the military must remain educated and become the masters of AI instead of training to be its servants.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/3Y3OXUAJ6ZCARLXH64MUWUYTYA.jpg)
Embrace new ways to buy software or the Pentagon will fall behind
Bryan Clark and Dan Patt from the Hudson Institute argue the U.S. military needs to evolve how it buys hardware and software or risk losing the tools required to defeat adversaries.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/47H7ELT7AVEZDAV5CRUHKZQAFI.jpg)
How agencies can better manage their zero-trust architecture
Zero trust is a journey. To make it more manageable, agencies should first focus on consolidating identity solutions.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/PVZL4PAISNAVBDKZPJ74B27KE4.jpg)
Agencies can bolster security through AI and a talent-diverse cyber workforce
Automation and the veteran workforce offer strong avenues for federal agencies to improve their cybersecurity.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/VITP3DLCHBESRATP7MFJQYRXXM.jpg)
GPS interference crashed a survey drone in the UK. Will the debate resonate in the US?
Dana Goward argues that a December drone mishap in the United Kingdom may be viewed as a relatively minor event, but could have a impact on a debate over GPS interference in the United States.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/SPQTUFFMHRFI7FZBGH36NHJ5MA.jpg)
The key to securing the defense industrial base is collaboration
It is no longer acceptable to rely on incident response protocols, performance assessments of existing systems and one-off reactions to threats without coordination. Increased information sharing is key to staying one step ahead of our adversaries.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/5JNPU2DINNASHIIXLXNUMWTCR4.jpg)
Why military agencies must establish cybersecurity readiness now through Comply-to-Connect
Katherine Gronberg argues readiness means forces can instantaneously know whether and how malicious cyber activity may have deceived, or even destroyed, systems
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/CAJNURUIQBGCLM6664UO5WHPCI.jpg)
Understanding Russia’s quest to rid itself of foreign tech
Will a Russian rule requiring pre-approved software to be installed on devices promote domestic innovation? Perhaps, argues Justin Sherman, but perhaps not in the way Russia expects.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/32MZBCS76JDYPNWSFZYRBRPCRQ.jpg)
Three strategies to help the digital Air Force achieve takeoff
The Air Force must ask the question, “What data values do we want to definitely monitor?” and then expose those data values to their monitoring protocols.
The networks that special operators need
Airborne ISR now needs to be institutionalized into a Department wide, always available, global capability.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/OWOL7A3TTZGO7FMM44VHLMBKMQ.jpg)
Protests, a pandemic and evidence of a hybrid war
The unrest and riots that erupted in the wake of George Floyd protests are evidence that a full-scale hybrid war is being waged against the United States, aimed at undermining their geopolitical leadership.
Defending national security in an era of remote work
Balancing productivity with the need to defend national security over a period of upcoming months, if not years, represents a challenge and opportunity as DoD personnel turn to commercially available telework tools.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/6UVNMDWNEZFNFFH5TXJBFUEW5Q.jpg)