News
Two Companies Team Up To Deliver Airborne Counter-Drone System
1+ day, 9+ hour ago (182+ words) Honeywell Aerospace announced Tuesday a collaboration with dual-use aerospace company Odys Aviation, which is building hybrid-electric vertical take-off and landing aircraft. Together, the companies plan to develop a counter-unmanned aerial system (C-UAS) that will protect critical infrastructure from drone threats....
From Bombers to Bytes: Rethinking Cyber Operations in Light of the Russia-Ukraine War
2+ day, 9+ hour ago (1277+ words) From Bombers to Bytes: Rethinking Cyber Operations in Light of the Russia-Ukraine War'afcea.org From Bombers to Bytes: Rethinking Cyber Operations in Light of the Russia-Ukraine War Since Desert Storm, military thinkers and futurists have increasingly believed cyber operations were…...
Rethinking the Meeting Experience With Mission-Embedded, AI-Enabled Collaboration Infrastructure
2+ day, 9+ hour ago (578+ words) As federal missions grow more complex and distributed, agencies across the defense, intelligence and civilian communities are rethinking how they collaborate. Meeting rooms, command centers and executive spaces are no longer just venues for briefings'they are mission infrastructure that must…...
President's Commentary: Strategically Securing Critical Infrastructure
2+ day, 9+ hour ago (555+ words) President's Commentary: Strategically Securing Critical Infrastructure'AFCEA International President's Commentary: Strategically Securing Critical Infrastructure The new national cyber strategy'which may be released before this column is published'is expected to focus on six pillars, according to National Cyber Director Sean Cairncross, who…...
Disruptive By Design: The Lie We Tell Ourselves About Cybersecurity Ownership
2+ day, 9+ hour ago (174+ words) But that instinct has created a structural blind spot. This is where the broader issue becomes clear. When cybersecurity is treated as an IT function, these realities remain disconnected from the program. In an environment where foreign adversaries actively harvest…...
Maryland ‘Guards’ Against Cyber Attacks With Collaboration
2+ day, 9+ hour ago (287+ words) With cyber attacks becoming increasingly common, dangerous and complex, state military officials are attempting to get out ahead of the enemy and be proactive rather than reactive. This principle is one that defense cyber teams observed during the original August…...
Economic Hardship Leads the Way for Cybercrime
2+ day, 9+ hour ago (309+ words) Economic Hardship Leads the Way for Cybercrime'AFCEA International Economic Hardship Leads the Way for Cybercrime As investment in national cybersecurity has grown, so has the focus on improving the quality of life for the Moldovan population. With a public consisting…...
Moldova’s Mighty Mission to a Cyber Resilient State
2+ day, 9+ hour ago (1203+ words) Having gained its independence following the collapse of the Soviet Union in 1991, Moldova is one of Europe's poorest countries and is vulnerable to cybersecurity attacks. However, in the last few years, resources have grown, talent has evolved and is making…...
The Coming Swarm: Drone Technology Continues To Evolve
2+ day, 9+ hour ago (894+ words) Unmanned aerial vehicles (UAVs), or drones, are a considerable threat that the United States and NATO need to address. The ability of small UAVs, especially, to carry deadly payloads of munitions and sophisticated sensors creates great risk, experts say, and…...
Tightening the Kill Chain
2+ day, 9+ hour ago (410+ words) The U.S. Air Force's Bamboo Eagle exercise is meant to test the service's tactical and operational command and control (C2) in a contested environment." The latest iteration, Bambo Eagle 26-1, held February 11-20, tested a global framework of airpower, warfighters and their systems to…...