:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BMG3NVAY6RHL7KWCQMB73R33AA.png)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6UBD4UI2DJBU5LXBCALCTKLAX4.jpg)
Three keys to standing up the Army’s Modernization Command [Commentary]
As the Army stands up the Modernization Command, it faces some daunting, yet addressable challenges. Here are the big obstacles they need to overcome.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FGC3AKRHBJC33D732254EP4QT4.jpg)
Net Defense Blogs
Solving the challenges of change [Commentary]
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Speculation over national security, cyber under Trump presidency
What does the 45th presidency have in store for our nation’s defense and, more specifically, the cyber domain?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cyber: Thankful and fearful
We have a lot of things to be thankful for when it comes to our current cyber capabilities just as we have a lot of things to be fearful about the cyber environment.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cybersecurity forces overwhelmed?
The introduction of new and emerging technologies is accelerating at a level not seen before in history. Can we keep up?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cyberattacks on data: A target-rich environment
The information we have and use on a regular basis is perhaps the greatest asset this nation has.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Espionage: Is the defense and intelligence community compromised?
Insights into a late draft of a report by the U.S.-China Economic and Security Review Commission were leaked last week, and the information is quite concerning.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cyber tensions rising
If you scan the recent headlines, it is easy to see that international tensions have increased lately, and cyberspace is no exception.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cyber weapons spark increased concern
Government and military leaders seek insights on cyber weapons and how to control them.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
Cyber in hybrid warfare
Cyber has a prominent role in hybrid warfare alongside information warfare and counterintelligence and disinformation components.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)
U.S. arms sales: Are cyber weapons included?
Think about the massive infrastructure that is needed to design, construct and deliver a conventional weapon, and compare that to the infrastructure that is needed to construct and deliver a cyber weapon.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2HMVPUQWOVCLHNAVUDY6LRNXQM.jpg)