


Three keys to standing up the Army’s Modernization Command [Commentary]
As the Army stands up the Modernization Command, it faces some daunting, yet addressable challenges. Here are the big obstacles they need to overcome.

Net Defense Blogs
Solving the challenges of change [Commentary]
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?

Speculation over national security, cyber under Trump presidency
What does the 45th presidency have in store for our nation’s defense and, more specifically, the cyber domain?

Cyber: Thankful and fearful
We have a lot of things to be thankful for when it comes to our current cyber capabilities just as we have a lot of things to be fearful about the cyber environment.

Cybersecurity forces overwhelmed?
The introduction of new and emerging technologies is accelerating at a level not seen before in history. Can we keep up?

Cyberattacks on data: A target-rich environment
The information we have and use on a regular basis is perhaps the greatest asset this nation has.

Espionage: Is the defense and intelligence community compromised?
Insights into a late draft of a report by the U.S.-China Economic and Security Review Commission were leaked last week, and the information is quite concerning.

Cyber tensions rising
If you scan the recent headlines, it is easy to see that international tensions have increased lately, and cyberspace is no exception.

Cyber weapons spark increased concern
Government and military leaders seek insights on cyber weapons and how to control them.

Cyber in hybrid warfare
Cyber has a prominent role in hybrid warfare alongside information warfare and counterintelligence and disinformation components.

U.S. arms sales: Are cyber weapons included?
Think about the massive infrastructure that is needed to design, construct and deliver a conventional weapon, and compare that to the infrastructure that is needed to construct and deliver a cyber weapon.
