The end of an era of war in Iraq and Afghanistan suggests a larger role for the State Department in foreign policy formulation, but is it prepared to step up?
A vulnerability discovered in one of the Internet's foundational programs shocks the open source community and poses dire risks for federal IT systems. // Flickr user Descrier
Some GBC findings suggest that Daniel’s non-technical credentials could actually be an asset in dealing with the current cyber threat landscape.
To stop the tens of thousands of cyber attacks against them each year, federal agencies are turning to continuous monitoring, which uses big data analytics to detect potential threats.
DoD is ahead of the curve in continuous diagnostics & mitigation (CDM), but is its data infrastructure ready for the Three V's?
Just months before its December drawdown deadline, the military’s retrograde operations still face considerable hurdles
Ever since the fluorescent cubicle seclusion model co-opted the souls of designers in the 1960s, the convention has had few challengers-- until now.
Although management and security challenges remain, mobility could be key for attracting innovative employees.
Adapting to a more commercialized defense acquisition process will pit DoD's efforts to maintain control over intellectual property against the pressures of the global marketplace.
While improving cloud security continues to be an important theme as the world prepares for the Internet of Things, human factors --not a direct breach of Apple’s systems-- were the likely cause of the leak.
The Pentagon’s updated acquisition reform initiative emphasizes technological innovation, but its efforts to improve communication among stakeholders are at least as important.