


Opinion
Five priorities for advancing NATO’s space mission
NATO’s progress in the "final frontier” is notable but insufficient, argue RAND analysts Anca Agachi, Shaan Shaikh and Bruce McClintock.

Opinion
Tariffs or not, China’s infiltration of US systems needs new attention
The challenge facing the U.S. and allied governments is how to protect systems, citizens, infrastructure and industries from data theft.

Three obstacles are slowing space sensors for hypersonic threats
Three obstacles impede progress on America's ability to track both emerging hypersonic missiles and today’s ballistic missile threats.

Don’t just put the latest cybersecurity report on a shelf because of the pandemic
A new report to Congress made roughly 75 recommendations for how the United States can better protect and defend against cyberattacks, but this list may be too much as the administration and Congress will likely be too much following the COVID-19 pandemic.

The most resilient organizations follow outcome-based cybersecurity
Compliance-based cyber is a comforting checklist of determining a risk profile, setting controls, and measuring compliance to controls. That’s become foundational to cyber security programs, but it’s obviously not sufficient.

The US Air Force is adapting to the pandemic to keep missile systems running
Software developers and maintenance technicians are continuing to work through the coronavirus pandemic to keep an automated nuclear messaging and targeting system for ICBMs performing its function every day.

What COVID-19 can teach us about cyber resilience
COVID-19 has created increased stress on our logistic, digital, public, and financial systems and this could in fact resemble what a major cyber conflict would mean to the general public.

The new imperative: Connecting the joint force with a digital advantage
While the U.S. military operates sophisticated weapons systems, it is not networked in a way that reflects the digital connectivity we all depend on in our everyday lives.

The battle against disinformation is global
Disinformation-spewing online bots and trolls from halfway around the world are continuing to shape local and national debates by spreading lies online on a massive scale.

4 strategies for securing the tactical edge
Here are some cybersecurity strategies the military can deploy to protect their networks at the tactical edge.

How to secure the U.S. government’s technology supply chain
In light of the unease of the U.S. government’s top cybersecurity boss over weaknesses in the nation’s technology supply chain, here are several recommendation.
