DEFENSE - ALL ARTICLES

Results 51-60 of 12776
Iraqi Counter-Terrorism Service soldiers coordinate to tactically enter and clear rooms during an urban operation terrain exercise near Baghdad, Iraq.

For the U.S. Army, 'Cyber War' Is Quickly Becoming Just 'War'

Combat brigades will soon head into firefights with cyber specialists…and possibly IT lawyers.

Gen. John Nicholson briefs reporters at the Pentagon in 2016.

Afghanistan Needs ‘Thousands’ More Troops, U.S. General Says in New Assessment

The commander of U.S. forces lays the first major war decision on President Donald Trump’s desk.

A woman walks past anti-Saudi and U.S. graffiti sprayed on a wall of the closed Saudi embassy in Sanaa, Yemen in 2015.

Trump's Attack on the Legitimacy of Critiquing Military Operations

The president took to Twitter to argue that publicly discussing the success or failure of a mission “only emboldens the enemy.”

Former NSA Contractor Indicted for Stealing Classified Files

Grand jury accepts Justice Department allegations against Harold Martin.

Xi Jinping is seen in Beijing in December.

Donald Trump and China’s President Finally Broke the Ice — By Snail Mail

In his letter to Xi, Trump wished the Chinese people a "happy Lantern Festival," though the Lunar New Year holiday period ended last week in China.

USAID Faulted for Lax Oversight of Afghan Land Reforms

SIGAR found that $41.2 million contract lacked vital information.

A man walks amid the rubble of a house destroyed by a Saudi-led airstrike on the outskirts of Sanaa, Yemen, Thursday, Feb. 2.

What Are U.S. Forces Doing in Yemen in the First Place?

Last week’s raid was an embarrassing and costly failure—in the context of a much larger one.

The Future Depends on Fixing Readiness Now, Vice Chiefs Tell Lawmakers

Service leaders’ annual pilgrimage to Capitol Hill also serves as Phase One of Mattis’ long-range plan.

Marine One, with President Donald Trump aboard, lands at Dover Air Force Base, Del., Wednesday.

President Trump Is Not Responsible for the Failed Raid in Yemen

America cannot punish its elected officials for allowing its military, diplomatic corps, and intelligence services to take risks necessary to pursue its interests.

Homeland Security Secretary John Kelly pauses while speaking at a news conference at the U.S. Customs and Border Protection headquarters in Washington on Tuesday.

Some DHS Employees Are Suspicious of ‘Extreme Vetting’

The Department of Homeland Security has 30 days to figure out what "extreme vetting" means. Some DHS officials and counterterrorism experts find the concept dubious.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.