The end of an era of war in Iraq and Afghanistan suggests a larger role for the State Department in foreign policy formulation, but is it prepared to step up?
ALL INSIGHTS POSTS
Some GBC findings suggest that Daniel’s non-technical credentials could actually be an asset in dealing with the current cyber threat landscape.
To stop the tens of thousands of cyber attacks against them each year, federal agencies are turning to continuous monitoring, which uses big data analytics to detect potential threats.
DoD is ahead of the curve in continuous diagnostics & mitigation (CDM), but is its data infrastructure ready for the Three V's?
Just months before its December drawdown deadline, the military’s retrograde operations still face considerable hurdles
Ever since the fluorescent cubicle seclusion model co-opted the souls of designers in the 1960s, the convention has had few challengers-- until now.
Why open source, hybrid clouds are the key to a more modern government
Although management and security challenges remain, mobility could be key for attracting innovative employees.
Adapting to a more commercialized defense acquisition process will pit DoD's efforts to maintain control over intellectual property against the pressures of the global marketplace.