Fifth Domain
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Videos
  • Newsletters
  • © 2021 Sightline Media Group
  • DHS
  • FBI/DOJ
  • OMB
  • CYBERCOM
  • Air Force
  • Army
  • Marine Corps
  • Navy
  • Capitol Hill
  • Policy
  • Career
  • Education/Training
  • Opinion
  • White Papers
  • Show Reporters
  • Special Multimedia Reports
  • Insights from Raytheon

Career

  • In this age of telework, dangers continue to lurk at home in digital meetups. But there are steps you can take to ensure privacy. (gorodenkoff/Getty Images)
    Government meeting? Work call? Virtual happy hour? How to better secure that meetup

    In this age of telework, dangers continue to lurk at home in digital meetups. But there are steps you can take to ensure privacy.

    Andrew Eversden
    March 31, 2020
  • Before Keenan Skelly became a tech executive, she was an Explosive Ordnance Disposal technician in the Army.
    EOD tech’s advice for women in tech

    Keenan Skelly, an EOD veteran and an executive at Circadence gives women skills on working on a male-dominated field.

    Daniel Woolfolk/Staff
    November 22, 2019
  • The federal government has a shortage of cybersecurity professionals. (eclipse_images)
    What government can do to keep its cyber workforce

    The government needs to show cybersecurity pros their value and invest in their careers, industry said.

    Andrew Eversden
    August 13, 2019
  • Cyber professionals transitioning from federal or military service into the commercial industry should keep a few things in mind. (Daniel Woolfolk)
    Tips for cybersecurity vets starting a company

    Cyber professionals transitioning from federal or military service into the commercial industry should keep a few things in mind.

    Daniel Woolfolk
    June 11, 2019
  • Sgt. 1st Class Michael Deblock with the Vermont Army National Guard Computer Network Defense Team discusses new ways to make the exercise more challenging for cyber defenders with a fellow Red Cell team member during the 2014 Cyber Shield exercise at the National Guard Professional Education Center, North Little Rock, Ark. (U.S. Army Photo by Staff Sgt. Kelvin Green)
    Here’s how DoD organizes its cyber warriors

    This is part one of a series exploring the differences between military cyber forces, capabilities, mission sets and needs.

    Mark Pomerleau
    July 25, 2017
  • Ken Foster, a computer network analyst with the California Army National Guard Computer Network Defense Team, assists one of his fellow analysts to defend against a simulated virus attack during the 2014 Cyber Shield exercise at the National Guard Professional Education Center in North Little Rock, Ark., on April 30, 2014. (Capt. Kyle Key/U.S. Army National Guard)
    Lifecycle management approach to tech, talent could address cyber skills shortfall [Commentary]

    A magnifying glass has been focused on the significant shortfall in cybersecurity talent in the government.

    Tom McAndrew, Coalfire
    November 20, 2017
  • Soldiers conduct cyberspace operations during a training rotation for the 2nd Stryker Brigade Combat Team, 2nd Infantry Division, at the National Training Center at Fort Irwin, Calif., Jan. 24. (Army)
    New in 2018: Army cyber expands training, gains EW soldiers

    The Army’s growing cyber career field will gain the service’s electronic warfare soldiers in 2018.

    Kathleen Curthoys
    December 29, 2017
  • Cyber Command now looking to equip its cyber warriors

    Cyber Command is now looking to equip its cyber warriors with tools and platforms to conduct full spectrum cyber operations.

    Mark Pomerleau
    March 30, 2017
  • Cybersecurity industry and Trump's 2018 budget proposal [Video]

    Symantec's Chris Townsend, vice president of federal, and Jeff Greene, senior director of global government affairs and policy, discuss the president's budget and what it means for the cybersecurity industry.

    Aaron Boyd
    May 23, 2017
  • Agencies will implement a new coding structure beginning this month to identify employees that perform critical cyber functions. (JONATHAN NACKSTRAND/AFP/Getty Images)
    Agencies to begin assigning NICE codes to cyber, IT positions

    Agencies will soon be able to provide greater specificity on the critical cybersecurity roles performed by members of their IT workforces, as this month they began to implement a new coding structure to identify those positions.

    Jessie Bur
    December 11, 2017
Quick Links
Newsletters CyberCon
Whitepapers E-Books
Most Watched Videos

How the DoD took on work-from-home- Actionable Intelligence

C4ISRNET reporter Andrew Eversden discusses how the Department of Defense took on work-from-home during the COVID-19 pandemic and what’s next.
promo
Defense Defined: What is electronic warfare?
promo
Defense Defined: What are pseudosatellites?
promo
Defense Defined. What's the cloud?
Sign up for our Daily Brief
Get the top Cyber headlines in your inbox every weekday morning.
Enter a valid email address
Enter a valid email address
Thanks for signing up!
For more newsletters click here
  • Newsletters
  • Contact Us
  • facebook icon
  • twitter icon
  • linkedin icon
  • https://www.fifthdomain.com © 2021 Sightline Media Group
    Not A U.S. Government Publication
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
Terms of Use
  • Terms of Service
  • Privacy Policy
Get Us
  • Newsletters & Alerts
  • RSS Feed
Contact Us
  • Help & Contact Info
  • Advertise
About Us
  • About Us
  • Careers
Military News
Air Force News
Army News
Marine Corps News
Navy News
Defense News
Federal News
C4ISR
Cyber
History