:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MLFYUBX6URB6DK6WC22CU3JXVE.jpg)
Thought Leadership
Is 2023 the year you become a government contractor?
The federal government spent around $637 billion on contracts in fiscal year 2022, including those covering professional support services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
Software Bill of Materials is the key to cybersecurity compliance
SBOMs can be a valuable tool to identify and address potential security challenges.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I3LF2EEUXJAZDLYBYG74FTPTCQ.jpg)
US foreign military sales process needs better communication
Allied nations often don’t know what they need to solve their problem or what the U.S. has to offer.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/UKHBF5ELIBBQJBVHXGEUYNQSII.jpg)
Pentagon must act now on quantum computing or be eclipsed by rivals
The battle for quantum supremacy is already under way, and is set to fundamentally change the defense sector .
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7DGID34ZMFG6HBBRLE7NR5MD2Y.jpg)
US can strengthen security by developing domestic rare earth resources
In the long term, the status quo around critical materials is unacceptable since it gives China a “kill switch” for America’s defense manufacturing.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4TPXGB44EBAKHJNQPWRQOTDYPE.jpg)
How to shift DoD’s supply chain mindset from tactical to strategic
The Pentagon should adopt an approach to its supply chain that combines “just in time” methods with “just in case” practices.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PLLR4FOEABA4HKU6C2ZRVGHNGA.jpg)
Washington is waking up on weapons for Taiwan
The legislation includes much-needed guidance to the U.S. Defense and State Departments to prioritize the delivery of arms to Taiwan.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4MW46AVAD5HMHBTZZ6H3VOTH3Y.jpg)
Pentagon’s Office of Strategic Capital must win over Silicon Valley
The U.S. is doubling down on industrial goals, aiming to increase its role in the national security ecosystem and diminish that of its competitors.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/56WAZDZXSRHVNAC4YBI37W6QWY.jpg)
Indo-Pacific could serve as model for combatant command info sharing
Within the INDOPACOM region, military exercises have served as proof of concepts for new ways of sharing data and information across different scenarios.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VHTMTOG22JDBDBFDP36XJ4PD7I.jpg)
White House AI ‘Bill of Rights’ may risk national security
Privacy-Preserving Machine Learning may address core concerns of the blueprint without slowing the pace of U.S. innovation
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MFAKL5RQIVBQVJV6Z2E4IYYNCA.jpg)
Mine it in America — Securing the US military supply chain
Every F-35 strike fighter built for U.S. armed forces contains 920 pounds of rare earth materials — the majority of which is imported from China.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KXUXS7WQ6NHRPA4TKJRO44SF3A.jpg)
How Model-Based Systems Engineering can speed military modernization
A subset of digital engineering, MBSE uses models, computer design, analytics and software to create digital twins of prototypes quickly and efficiently.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AENNUCWM7ZAC3OXTSACE6QWAAY.jpg)
Information superiority and the race for global AI leadership
The Pentagon is pursuing a third offset strategy — one that puts Artificial Intelligence at the forefront of U.S. defense policy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VW2CHRPCKFEURKLMHKPUI2W63M.jpg)
The failure of integrated deterrence, and what to do about China
Modernization must not be sacrificed during this time of crisis, or we risk winning the battle to ultimately lose the war.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GZEB6CJSM5DAPJCJT25RVM6GX4.jpg)
Technical debt: The cybersecurity threat hiding in plain sight
The Biden Administration’s executive order on cybersecurity in May 2021 jump started the movement toward a zero trust architecture.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5UMZQ55D5BCWRFH4V4DAVOBTFM.jpg)