:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DRQEEKZ2WBDUHD54HOC25QZNPQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DRQEEKZ2WBDUHD54HOC25QZNPQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KLKSFR64DFER3LI5P25P3QA4YU.jpg)
How IT modernization can ‘future proof’ NATO
Baking security into applications undergirding the infrastructure of NATO’s IT will help ensure superior logistics, communications and force projection.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DWPJ5W3JRFCVHOS57GLGU2BS7M.jpg)
Thought Leadership
How to help Kyiv go on a drone offensive
Russia and Iran are planning to build a factory within Russia to produce thousands of Shahed-136 drones.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
The Pentagon must make a culture shift to embrace innovation
A culture of innovation is fundamental to acquiring, adopting and scaling new technologies that will give our men and women in uniform the advantage.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MLFYUBX6URB6DK6WC22CU3JXVE.jpg)
Is 2023 the year you become a government contractor?
The federal government spent around $637 billion on contracts in fiscal year 2022, including those covering professional support services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
Software Bill of Materials is the key to cybersecurity compliance
SBOMs can be a valuable tool to identify and address potential security challenges.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I3LF2EEUXJAZDLYBYG74FTPTCQ.jpg)
US foreign military sales process needs better communication
Allied nations often don’t know what they need to solve their problem or what the U.S. has to offer.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/UKHBF5ELIBBQJBVHXGEUYNQSII.jpg)
Pentagon must act now on quantum computing or be eclipsed by rivals
The battle for quantum supremacy is already under way, and is set to fundamentally change the defense sector .
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7DGID34ZMFG6HBBRLE7NR5MD2Y.jpg)
US can strengthen security by developing domestic rare earth resources
In the long term, the status quo around critical materials is unacceptable since it gives China a “kill switch” for America’s defense manufacturing.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4TPXGB44EBAKHJNQPWRQOTDYPE.jpg)
How to shift DoD’s supply chain mindset from tactical to strategic
The Pentagon should adopt an approach to its supply chain that combines “just in time” methods with “just in case” practices.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PLLR4FOEABA4HKU6C2ZRVGHNGA.jpg)
Washington is waking up on weapons for Taiwan
The legislation includes much-needed guidance to the U.S. Defense and State Departments to prioritize the delivery of arms to Taiwan.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4MW46AVAD5HMHBTZZ6H3VOTH3Y.jpg)
Pentagon’s Office of Strategic Capital must win over Silicon Valley
The U.S. is doubling down on industrial goals, aiming to increase its role in the national security ecosystem and diminish that of its competitors.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/56WAZDZXSRHVNAC4YBI37W6QWY.jpg)
Indo-Pacific could serve as model for combatant command info sharing
Within the INDOPACOM region, military exercises have served as proof of concepts for new ways of sharing data and information across different scenarios.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VHTMTOG22JDBDBFDP36XJ4PD7I.jpg)
White House AI ‘Bill of Rights’ may risk national security
Privacy-Preserving Machine Learning may address core concerns of the blueprint without slowing the pace of U.S. innovation
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MFAKL5RQIVBQVJV6Z2E4IYYNCA.jpg)
Mine it in America — Securing the US military supply chain
Every F-35 strike fighter built for U.S. armed forces contains 920 pounds of rare earth materials — the majority of which is imported from China.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KXUXS7WQ6NHRPA4TKJRO44SF3A.jpg)
How Model-Based Systems Engineering can speed military modernization
A subset of digital engineering, MBSE uses models, computer design, analytics and software to create digital twins of prototypes quickly and efficiently.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AENNUCWM7ZAC3OXTSACE6QWAAY.jpg)