The U.S. Navy’s network infrastructure was put to the test in the ongoing conflict in the Middle East. In his first few weeks as director of Naval Enterprise Networks (NEN) at Program Executive Office ...
"Forging a Qualified Force to Win in Cyberspace" On March 24-26, 2026, AFCEA International will host Cyber Workforce Summit 2.0 in cooperation with the DoW CIO and the National Defense University. To ...
With the release of the Chief of Naval Operations’ Fighting Instructions, and the strategic direction provided by the Secretary of the Navy, the imperative for the Navy’s Information Warfare Community ...
The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level.
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
The Department of the Air Force (DAF) is on the hook for meeting the challenge of air- and space-related joint all-domain command and control. Having spent the last couple of years validating the ...
Outmaneuver and constrain foreign intelligence entities: focusing on detecting, understanding and countering foreign intelligence threats, including cyber activities, through proactive and innovative ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
The U.S. Army is making military history, announcing that the branch is becoming the first-ever U.S. Department of Defense (DoD) service to implement a generative artificial intelligence (AI) platform ...
After several years of development and experimentation, U.S. Army officials are applying their initial continuous authority to operate (cATO) projects to existing software. The Department of Defense ...
As the U.S. Army transforms itself into a data-centric force enabled by artificial intelligence (AI), the service also is developing new methods for testing the security of those AI systems. AI is ...
For years, the cyber domain was perceived as a virtual one. However, every cyber attack leaves a tangible footprint—a compromised server, a disrupted infrastructure or a breached supply chain. When ...