Similar Articles |
|
National Defense March 2013 Valerie Insinna |
Defense Department to Wring Savings From Its Info-Tech Buys Although the Defense Department continues to pour funding into information technology initiatives, contractors may find the pool of money shrinking over the next five years. |
National Defense February 2015 Meloni & McCoy Jr. |
Defense IT Investment to Focus on Big Data, Cloud As the Defense Department cuts spending on information technology, it is focusing on a "technological offset strategy" to counterbalance a shrinking fighting force. |
National Defense June 2015 Lloyd McCoy |
Navy IT Priorities Stress Security, Efficiency With the Navy projecting flat spending over the next few years, it will be looking to information technology to help meet its goals. |
Parameters Autumn 2007 Gregory L. Cantwell |
Nation-Building: A Joint Enterprise When America's Army is at war, is the nation also at war? |
National Defense November 2014 Stephanie Meloni |
Army Seeks to Simplify, Create More Interoperability for Information Systems Success in this simplification strategy may be a bellwether for cost savings across the Defense Department. |
National Defense April 2006 Claude V. Christianson |
Joint Logistics: A Personal Perspective We have an opportunity to significantly advance our systems, processes and organizations to improve support for the joint force commander -- and we must seize it, says this Army Lt. Gen. and director for logistics on the Joint Staff. |
National Defense May 2005 Lawrence P. Farrell |
Successful Net-Centric Operations Require Joint Testing The wars U.S. forces are fighting today---and can be expected to fight in the foreseeable future---undoubtedly are shaping the military services' requirements for new and improved technology. |
Parameters Summer 2004 Brownlee & Schoomaker |
Serving a Nation at War: A Campaign Quality Army with Joint and Expeditionary Capabilities The United States is driving a rapid evolution in the methods and techniques of war. |
National Defense March 2013 Stew Magnuson |
Chemical-Biological Defense Office To Kick Off Dozens of New Programs The previous decade has seen little in terms of advancement of nuclear-radiological detection devices, and there will be a new push to update them. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
InternetNews December 8, 2008 Richard Adhikari |
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. |
Parameters Summer 2005 Cebrowski & Raymond |
Operationally Responsive Space: A New Defense Business Model As the major defense power in the world, the United States military must dare to compete with itself to ensure sustained advantage. We must set our own standards. Space has long been an arena of American dominance. That must continue. |
National Defense November 2004 Roxana Tiron |
Pentagon Seeks Joint Doctrine, Training for Personnel Recovery Despite accounting for each and every missing soldier in the Iraq war the combat search and rescue community is stretched thin and grappling with gaps ranging from policy to training. |
National Defense August 2011 Zhen Zhang |
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. |
Parameters November 2004 Augustus W. Fountain Iii |
Transforming Defense Basic Research Strategy The US armed forces currently enjoy an unprecedented level of technological superiority across the full spectrum of military threats. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
National Defense March 2008 Stew Magnuson |
Goal of a `Network-Centric' Military Seems Distant Unblocking communications and data sharing barriers is necessary if the military will achieve its longtime goal of becoming a network-centric force. |
National Defense June 2015 Haber & Jeffress |
Pentagon Must Tread Carefully On 'Joint' Weapon Acquisitions With downward budgetary pressures on U.S. defense spending, it will be worth watching how the Pentagon moves forward with joint-service acquisitions. |
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. |
InternetNews January 28, 2009 Richard Adhikari |
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. |
Parameters Winter 2005/2006 Mitchell J. Thompson |
Breaking the Proconsulate: A New Design for National Power There have been few truly transformational changes to the institutions of national security, only slight modifications to the existing ones. |
National Defense April 2004 Steve Callicutt & Larry McKee |
Air Force Takes Lead in Net-Centric Operations The U.S. military services have made significant progress in networking their weapons systems and sharing battlefield data during the last 10-15 years. But more work is needed to ensure seamless information flow and to improve joint command-and-control. |
InternetNews October 14, 2010 |
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. |
National Defense December 2004 Michael Peck |
Quick Mission Rehearsals Goal of Joint Training Slashing the rehearsal time needed for joint training missions from months to days is one of the goals of the joint national training capability (JNTC), a concept designed to move joint warfare from rhetoric to reality. |
National Defense May 2004 Lawrence P. Farrell Jr. |
`Information Fusion' Key to Winning Wars What made a huge difference in the Iraq and Afghanistan wars, said Roche, was the fusion of information. |
Information Today November 7, 2013 George H. Pike |
U.S. Government Releases Proposed Cybersecurity Framework The Obama administration is taking public comments on a proposed framework for improving cybersecurity in communication and other critical industries. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
PC World September 17, 2002 |
National Cybersecurity Plan to Debut Users, vendors have a role in helping secure cyberspace, in Bush strategy still in the works. |
CIO October 1, 2005 Ben Worthen |
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. |
InternetNews February 26, 2009 Richard Adhikari |
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. |
National Defense August 2012 Sandra I. Erwin |
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. |
National Defense August 2013 Lou Kratz |
As Spending Comes Down, Strategic Choices Needed After more than a decade of conflict, the United States has begun to draw down defense spending, with sequestration cuts expected to continue over the coming years. |
CIO January 1, 2003 Elana Varon |
Think Federally, Secure Locally When the Pacific Northwest Economic Region needed a regional cybersecurity vulnerability assessment, it didn't run to the feds. Instead, the group developed its own exercise, called Blue Cascades, that explored what would happen if critical services like the electric grid or the Internet were lost. |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense September 2013 Jeffrey Trumbore |
Combat Experience of Bomb-Disposal Teams Should Be Codified The last 12 years of conflict have firmly established the roles of explosive ordnance disposal teams in supporting joint operations. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense March 2009 Grace V. Jean |
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. |
InternetNews May 1, 2009 Alex Goldman |
Defense Industry Data Needs Its Own Defenses The U.S. military only recently began to coordinate cybersecurity with private companies. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
InternetNews April 8, 2009 Alex Goldman |
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. |
New Architect January 2003 Bret A. Fausett |
Ask Not What the Internet Can Do for You Your role in national security: the government's "National Strategy to Secure Cyberspace" starts in the home with the individual user. |
InternetNews May 29, 2009 Kenneth Corbin |
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. |
InternetNews July 8, 2010 |
Feds Work for Private-Sector Cybersecurity Deal Public-private partnerships are viewed as the way to go for proper cybersecurity, but experts warn there are still pitfalls. |
National Defense August 2013 Macgregor & Burke |
Defense Industry Can Profit Despite Downturn For the first time in decades, the Defense Department must aggressively pursue value, not simply effort. The current practice of rewarding senior military leaders and defense appointees for effort, time, staff size and budget rather than bold, effective achievement must be arrested. |
CRM January 2010 Donna Fluss |
Contact Center Innovation: What to Expect in 2010 Organizations must change their mission and culture to benefit from new technologies. |
Information Today October 20, 2015 Barbie E. Keiser |
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. |
CIO June 26, 2009 Kim S. Nash |
Obama's Cybersecurity Push: What It Means for CIOs President Obama aims to fix U.S. cybersecurity, but can the feds hit a moving target? Not without private sector support and practical solutions. |