:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XPKKW5B7JVBTFKKI7QFAMDZTSQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XPKKW5B7JVBTFKKI7QFAMDZTSQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SZN6B2QQLJB2BPNUWP4AGY2AXM.jpg)
Opinion
How automated tagging helps mission teams securely share information
Data-centric security safeguards information regardless of where it’s located or who it’s shared with, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3DQ225KJBJGGLI7XK5BYBZ3GKE.jpg)
Opinion
In the pipeline: The impact of TSA cybersecurity directives
Continuous monitoring provides real-time visibility into anomalous activities, unauthorized access attempts and potential threats, the author argues.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VKFRD4Q64FC6BFA3WKY2KZUZCA.jpg)
Cybersecurity and Infrastructure Security Agency curbs telework
Remote workers outside of the national capital region are not affected by the decision.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
Cyber attacks reveal uncomfortable truths about US defenses
It should be recognized that cybersecurity systems can be just as flawed as the systems they protect, the author says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3T6LCSAGJFAJ5ISIYQZSMIWBC4.jpg)
Opinion
How to optimize Internet of Things security while promoting innovation
The Federal Communications Commission is seeking public comments on the proposed cybersecurity labeling program.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TLZL7RIVWJD4LBQHXTXALWH6KQ.jpg)
Allies first: The future of military data sharing?
The Ukraine war has reaffirmed the vital importance of enabling militaries to communicate faster, more efficiently and safely with each other.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/35CAA3IBNFAILJZ3XUEQ6W2ODM.jpg)
Estonian firm develops virtual ‘shooting range’ to test cyber defenses
CybExer Technologies works with Estonian Defence Forces, as well as the armed forces of a number of European countries including Ukraine.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6DNFYPMNLFGDPNIJRYJ5DZGH74.jpg)
Babcock, Palantir bank on data crunching to boost UK force readiness
The British defense contractor is smitten with the possibilities of Palantir's Foundry data analytics system.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HCGDLS7P4ZGLJATOTN3QOQGZ5E.jpg)
Australian, UK and US tech companies already reaping AUKUS benefits
Australian, UK and US companies may see greater collaboration under AUKUS. But they're not waiting on official details - many are working together already.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DJN2IS4DNFAVFPNPRVYU6CQECY.png)
PowerPoint creator, unwitting pioneer of military lethality, dies
Dennis Austin had no way of knowing that his creation would be hijacked by head-exploding graphics-loving DoD personnel.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
How to protect critical infrastructure and ensure mission readiness
Organizations – especially critical infrastructure organizations – are under siege in cyberspace daily.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/QSWZ6WOU7BBURLWBQMUSSA4M2E.jpg)
China, Russia will use cyber to sow chaos if war starts, Pentagon says
The strategy describes China as a “broad and pervasive” cyber espionage threat and Russia as a malign online influence.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/V5MFPJAXLNDO7BV3UQATIP6AWE.jpg)
IAI lauds intel suite to predict surprise attacks as seen in Ukraine
The company's Starlight application looks for anomalies in everything from social media feeds to troop movement reports.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Opinion
What new federal cybersecurity policy means for government contractors
The most controversial section calls for holding software companies liable for producing insecure code.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4SV2XPCXPRDF7DV4ZXPWATWOZY.jpg)
Pentagon to review zero-trust blueprints across military services
“We’ve got to flip the script here, given what we face here in 2023 and beyond,” Pentagon CIO John Sherman said at a cybersecurity conference.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/RODAUIDBMJDU3NXACZRZRUUHVM.jpg)
White House Situation Room gets cutting-edge tech in $50M upgrade
This is where history happens, where the president meets with national security officials to discuss secret operations and sensitive government matters.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/447SUEJ4IREKBFIEARU3PCYLKE.jpg)
‘Data fabric’ can help militaries achieve supremacy on the battlefield
The paper is the result of dozens of surveys conducted over several months with key current and former high-ranking military officials around the globe.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TOHOCHWSNVAVTK7YJMCQHQQVMQ.jpg)