![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F08-18-2023%2Ft_43f8e824c76243edb769406e86e31de1_name_Thumb_532_Colin_Digital.jpg?auth=1e1f9305e2622e867a41cf10678b0d2e03e05aa48c1a274884c50faa8b7a15d6&width=1920&height=1080)
![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F08-18-2023%2Ft_43f8e824c76243edb769406e86e31de1_name_Thumb_532_Colin_Digital.jpg?auth=1e1f9305e2622e867a41cf10678b0d2e03e05aa48c1a274884c50faa8b7a15d6&width=1920&height=1080)
![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F01-20-2023%2Ft_936482f3f6954756ae5d4a0fff7072be_name_THUMB_Data_Centric_Army.jpg?auth=d89327e8a4212ab0e0354f3f2a39bfd8e9ee300c85287eb281eb34c2b51908a2&width=1920&height=1080)
With so many platforms online, how will tomorrow’s Army share data?
Army Enterprise Cloud Management Agency acting director Gregg Judge speaks to Defense News about what the military cloud landscape will look like.
![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F10-10-2022%2Ft_9a038d4402884d1881b6bf2dd06809c6_name_State_of_Modernization_PANEL_THUMB_1.jpg?auth=cbc9a6b2e215ebefd3e9603fff916bfda70f2c8bb5d1223490326a38a1ec78a4&width=951&height=538)
AUSA
Army modernization goals for 2022 and beyond
Army leaders discuss how they expect to meet ambitious plans for new weapon systems.
![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F10-10-2022%2Ft_3bad9763063546af8eb8bf7624af7b8b_name_TEXTRON_SMART_MINE_THUMB_1.jpg?auth=33dd01561430c1d149795923cbe8e3f5d794d86e8a001fbd6d35c384414e45f4&width=1920&height=1080)
'Area denial' weapon senses you coming, knows how to attack
Ever encounter a 'terrain shaping obstacle?' Textron has designed a way for soldiers to hit enemy vehicles remotely with their 'area denial' platform.
![](https://www.c4isrnet.com/resizer/v2/https%3A%2F%2Fd3k85ws6durfp9.cloudfront.net%2F10-10-2022%2Ft_430535b1f72242978474baa812ee8db0_name_GEN_FLYNN_BOOTH_INTV_v1_00_08_48_19_Still001.jpg?auth=88a9404c4db8620b07d1bb13da9d238574c9a7ac5b3856238596d4e10cc97ec2&width=1920&height=1080)
What's Pacific Command doing to deter conflict in the East?
Gen. Charles Flynn, of Army Pacific Command, updates Defense News on Pacific Command's efforts.
![](https://www.c4isrnet.com/resizer/v2/KSFMM5PEJBHGLHCMB3J5NCW73M.jpg?auth=692f90b596cb002cfbb382c0d45f518c35db3b307aad2d663c76fdb0d328fc59&width=1200&height=775)
Can security pros use the shutdown to their advantage?
Darien Kindlund, of Insight Engines, explains how savvy cybersecurity professionals could use the shutdown of the federal government to help improve protection strategies.
![](https://www.c4isrnet.com/resizer/v2/ZGSBSG2XN5DNZCRZ5TAMOLNH2Q.jpg?auth=7b8718d073d8b2e664f6b2618139001702d68a46f6d027615101241000294b55&width=1200&height=674)
The impact of AI on future warfare
Rear Adm. David Hahn, the Chief of Naval Research, explains how AI is causing a rapid change in how technology is developed.
![](https://www.c4isrnet.com/resizer/v2/3I64QRLNVVHF7JMIVMODGRS6WI.jpg?auth=6b80026fef530e52d7b8ab7d5409141267d2adea27daa4812e68785ebcdf43e7&width=1280&height=720)
FBI to hackers: Use your skills for good or it won’t end well
Fifth Domain talks cyber recruiting with the FBI at Black Hat.
![](https://www.c4isrnet.com/resizer/v2/V4YJMAAUDVHZNPAL4AXW4OBUIE.jpg?auth=fb1fbfcdd8060f948d154f17a2cd4c0323db4818762e1fe9be0033d7f4721959&width=1280&height=720)
What DHS is saying to companies at Black Hat [Black Hat 2017]
DHS has a specific goal at Black Hat.
![](https://www.c4isrnet.com/resizer/v2/RLPD4PSX3VB3BABHDGPGXF6REM.jpg?auth=20e5a3a247b0bf4081477fbef298cc4d04ed3da2be6220633edeb50a6fed1ba5&width=1280&height=720)
Does Russian meddling count as hacking an election? [Black Hat 2017]
Fifth Domain editor Aaron Boyd asks Black Hat attendees if they consider Russian meddling a hack.
![](https://www.c4isrnet.com/resizer/v2/P5KJKALMYRAWJNFCHSM7WUPAYM.png?auth=2d07a0ac462b7cdf80d93cecec3e190808aa727567d8b88bb2af1b8a578e06b2&width=555&height=281)
Deadly Skills Quickfire: Cybersecurity
Military Times puts Clint Emerson in the hot seat for some rapid-fire Q&A. Emerson is a retired Navy SEAL and author of "100 Deadly Skills."
![](https://www.c4isrnet.com/resizer/v2/P4MNHW6JMBABHFXBENTA4EFMQ4.jpg?auth=8eabbcc6549d175024d381d2d8cee4b5cf7ca47b606209833963ff3cb36c3131&width=1273&height=716)
State of Cyber with Bobbie Stempfley
Bobbie Stempfley, former DHS deputy assistant secretary for cybersecurity strategy and emergency communications, has a new role as director of Carnegie Mellon CERT. She joins us live to talk about the state of cybersecurity in government and the private sector.
![](https://www.c4isrnet.com/resizer/v2/33NTGDJJJJD65NIXDVZHE3HOZI.jpg?auth=8f6735f42a5d9f1cd6ee9b948ce62f1719c2574f192973e329cc55a21169aa40&width=1277&height=849)
Watch Ukrainian National Police raid company at center of global cyberattack [Video]
Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine.
![](https://www.c4isrnet.com/resizer/v2/5PEXNWEO25GFLENEQGG3WWWKEU.jpg?auth=5e036af50765f5af36de7af03bbec380b2831b0801affeeb8349d0214243948a&width=1905&height=843)
New US-Israeli working group to develop international cyber policy [Video]
The formation of a new U.S.-Israeli group was recently announced at Cyber Week 2017, a major international cyber summit in Israel. The group aims to use new methods of identifying adversaries in cyberspace.
![](https://www.c4isrnet.com/resizer/v2/4WWEUSKUVVH2DBEQCERFZA3BYQ.jpg?auth=d56b8875c01fdf3a5bc3f2dde07baf513f3c0cbd802a9d34562d288e29da8ae8&width=1280&height=720)
FBI's Cyber Most Wanted, part II [Slideshow]
Rundown on the top cyber criminals the FBI is seeking worldwide. Part II of II.
![](https://www.c4isrnet.com/resizer/v2/CEKXIS2HPVDWBCH3K7OHUDTRMA.jpg?auth=7f1b7bfaadaba6a894b45b6fc5abb9b70a6140a41fc51a167a881a81f7045982&width=2000&height=1286)
Profiles in cyber: Understanding the US's major adversaries in cyberspace
We build on previous reports, drawing from recent congressional testimony, published cybersecurity research and expert commentary to create a concise introduction and convenient reference to the distinct motives, narratives, strategies, capabilities and operations of each of major nation-state threat actor.
![](https://www.c4isrnet.com/resizer/v2/RFWTEEYNPNHWTC7RBL3KDRJ3FI.jpg?auth=e94434bafb922801a316a1574f0da1086b88f17b43a74f6197bbc39c19cbbd87&width=4256&height=2832)
Cyber priorities in Trump's 2018 budget
Former DHS acting Under Secretary for Management Chris Cummiskey on what President Trump's budget proposal has in store for cybersecurity and operations.
![](https://www.c4isrnet.com/resizer/v2/TDM25OJ5PRB7JH5CRK3L6FCAOY.jpg?auth=0a06ec98e9db35dd5b536f5964acd5d1785e2682b449e6c84b3dd1eb3bdd6485&width=4500&height=3400)
Breaking down Trump's cyber order with Paul Rosenzweig [Video]
President Trump signed an executive order on cybersecurity on May 11. Chertoff Group Senior Advisor and former DHS official Paul Rosenzweig joined us live to pick through the EO and answer your questions.
![](https://www.c4isrnet.com/resizer/v2/EVRNA27MBZGTNINOA4I6VFWTV4.jpg?auth=6783f5f47a53c4341896ad25576b970d450f1051e6e5a6bb002ed6a102873663&width=1920&height=1080)