Government cyber breach shows need for convergence
Keeping offensive and defensive cyber operations in silos results in exploitable weaknesses, according to three cyber experts.
Keeping offensive and defensive cyber operations in silos results in exploitable weaknesses, according to three cyber experts.
Social media has presented an opportunity for our adversaries to present a plethora of information that is meant to persuade our force.
What happens if China engages in a great power conflict and loses? Will the Chinese Communist Party’s control over the society survive a horrifying defeat?
Attacking the American cognitive space, in pursuit of split and division in this democratic republic, has an obvious goal. But what is the Russian return on investment?
The time needed to observe and assess, direct resources, make decisions, and take action will be too long to be able to muster a successful cyber defense.
Technical advancements bring us new options and abilities, and they increase mission success. But as with all uncharted territory, they also bring surprises and unanticipated outfalls.
AI is a top priority in the United States and to our friendly foreign partners, but potential adversaries will make the pursuit of finding ways to compromise these systems a top priority of their own.
There is too much turnover among non-commissioned officer/enlisted cyber operators to match the expanding need for a highly qualified and technically cognizant cyber force. Here's what the Army should do instead.
COVID-19 has created increased stress on our logistic, digital, public, and financial systems and this could in fact resemble what a major cyber conflict would mean to the general public.
What's in it for Iran to launch a massive cyber engagement against the free world? What can they win and what would their regime lose?