Fifth Domain
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Videos
  • Newsletters
  • © 2021 Sightline Media Group
  • DHS
  • FBI/DOJ
  • OMB
  • CYBERCOM
  • Air Force
  • Army
  • Marine Corps
  • Navy
  • Capitol Hill
  • Policy
  • Career
  • Education/Training
  • Opinion
  • White Papers
  • Show Reporters
  • Special Multimedia Reports
  • Insights from Raytheon

Thought Leadership

  • Opinion
  • White Papers
  • Show Reporters
  • Special Multimedia Reports
  • Insights from Raytheon
Editorial Whitepapers
Opinion
E-Books
  • It is no longer acceptable to rely on incident response protocols, performance assessments of existing systems and one-off reactions to threats without coordination. Increased information sharing is key to staying one step ahead of our adversaries. (Isometric infographic.)
    The key to securing the defense industrial base is collaboration

    It is no longer acceptable to rely on incident response protocols, performance assessments of existing systems and one-off reactions to threats without coordination. Increased information sharing is key to staying one step ahead of our adversaries.

    Teresa Shea
    July 15, 2020
  • (Jackie Niam/Getty Images)
    Why military agencies must establish cybersecurity readiness now through Comply-to-Connect

    Katherine Gronberg argues readiness means forces can instantaneously know whether and how malicious cyber activity may have deceived, or even destroyed, systems

    Katherine Gronberg
    July 13, 2020
  • Russian President Vladimir Putin chairs a Security Council meeting at the Novo-Ogaryovo residence outside Moscow Moscow, Russia, Friday, Feb. 21, 2020. (Alexei Druzhinin, Sputnik, Kremlin Pool Photo via AP)
    Understanding Russia’s quest to rid itself of foreign tech

    Will a Russian rule requiring pre-approved software to be installed on devices promote domestic innovation? Perhaps, argues Justin Sherman, but perhaps not in the way Russia expects.

    Justin Sherman
    July 6, 2020
  • An Indian Air Force commando stands in front of a Soviet-era Pechora air defense system on Sept. 27, 2019. (Sam Panthaky/AFP via Getty Images)
    India must actively protect its air defense systems’ OODA loop

    One of the crucial elements of India’s defensive capability that remains vulnerable is the OODA loop — observe, orient, decide and act — which is responsible for decision-making during times of crisis.

    Debalina Ghoshal
    June 30, 2020
  • Members of the 607th Security Forces Squadron use Google Maps to identify force protection threats during Key Resolve 16 at Osan Air Base, Republic of Korea, March 10, 2016. The section also uses GeoBase, which is a collection of satellite images, computers and digital software that can electronically send maps and environmental information to a user’s fingertips. (U.S. Air Force photo by Staff Sgt. Nick Wilson/Released)
    Three strategies to help the digital Air Force achieve takeoff

    The Air Force must ask the question, “What data values do we want to definitely monitor?” and then expose those data values to their monitoring protocols.

    Brandon Shopp
    June 30, 2020
  • As adversaries will continue to evolve and adapt to benefit from any circumstance, including telework, the public sector in response must adopt secure and modern practices to stay one step ahead and protect the nation’s most secure information. (eclipse_images/Getty Images)
    The ‘new normal’ marks the best time to implement zero trust security

    As adversaries continue to evolve and adapt to benefit from any circumstance, the public sector must adopt secure and modern practices to stay one step ahead and protect the nation’s most secure information.

    Curt Aubley
    June 8, 2020
  • The Commercial Virtual Remote Environment allows users to work without a virtual private network connection. (Airman 1st Class Kiaundra Miller/U.S. Air Force)
    Defending national security in an era of remote work

    Balancing productivity with the need to defend national security over a period of upcoming months, if not years, represents a challenge and opportunity as DoD personnel turn to commercially available telework tools.

    Greg Gardner
    May 28, 2020
  • With new standards, the time to prepare is now

    While it remains unclear what the full impact of COVID-19 will be on the CMMC process, defense contractors have no time to waste in preparing for this new certification.

    Bill Solms
    May 27, 2020
  • Classified spillage could be a security concern for federal agencies. (Kellyann Novak/ Air National Guard)
    Why agencies need to prevent a classified spillage

    Classified spillage is a major focus for agencies and contractors that are responsible for protecting our national interests and one of the reasons that led the Department of Defense to establish the Cybersecurity Maturity Model Certification.

    Wayne Starrs
    May 24, 2020
  • Thanks to advances in AI, human-agent teaming and machine learning, soldiers will provide commanders with real-time information about the enemy gathered from a variety of different sources, including possible courses of action, which will help them to make better decisions in battle. (Army)
    For ethical artificial intelligence, security is pivotal

    AI is a top priority in the United States and to our friendly foreign partners, but potential adversaries will make the pursuit of finding ways to compromise these systems a top priority of their own.

    Jan Kallberg
    May 19, 2020
Quick Links
Newsletters CyberCon
Whitepapers E-Books
Most Watched Videos

How newly-formed Space Force saved lives | Actionable Intelligence

A conversation with Nathan Strout of C4ISRNET.
promo
Securing battlefield data | Actionable Intelligence
promo
How the DoD took on work-from-home- Actionable Intelligence
promo
Defense Defined: What is electronic warfare?
Sign up for our Daily Brief
Get the top Cyber headlines in your inbox every weekday morning.
Enter a valid email address
Enter a valid email address
Thanks for signing up!
For more newsletters click here
Current Edition
  • Subscribe
  • Digital Edition
  • Newsletters
  • Contact Us
  • facebook icon
  • twitter icon
  • linkedin icon
  • https://www.fifthdomain.com © 2021 Sightline Media Group
    Not A U.S. Government Publication
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
Terms of Use
  • Terms of Service
  • Privacy Policy
Get Us
  • Newsletters & Alerts
  • RSS Feed
Contact Us
  • Help & Contact Info
  • Advertise
About Us
  • About Us
  • Careers
Military News
Air Force News
Army News
Marine Corps News
Navy News
Defense News
Federal News
C4ISR
Cyber
History