Click on the image below to see our most recent issue:
Featured Articles
By Joe Billingsley
March 6, 2023
The 2023 National Cybersecurity Strategy lays the groundwork to increase cyber liability and cyber lawyers.
(Image: White House)By Josh Baughman
January 17, 2023
The PLA Rocket Force is shifting to use Virtual Reality (VR) simulation in order to better prepare for war and increase their combat capability. A review of reports show how the Rocket Force is using VR to create a better prepared and more combat ready Rocket Force.
(Image: PLA Daily)By Brad E. Rhodes, Colonel, US Army Reserve
December 1, 2022
With the ubiquitous spread of internet connectivity, the influence of what our Reservists and National Guard members do through their Defense Support of Civil Authorities (DSCA) responsibilities and their support to homeland emergency response can and will influence perception of the American people. What can planners and commanders do to seize the initiative through information operations during these actions?
(Image: Security Boulevard)By Paul F. Renda
November 21, 2022
What can we learn about the state of STEM education in the United States by comparing global metrics?
(Image: oecd.org)By Josh Baughman
October 21, 2022
China is building training exercises in the metaverse in order to increase their training and future combat capabilities.
(Image: news.chine.com.cn))By Morgan VanderLeest
August 19, 2022
Ransomware is an increasing threat to society, including against the United States’ critical infrastructure. At what point does the attack become an act of war instead of an unlawful act?
(Image: Kaspersky)By Tomas Pena
May 6, 2022
Defending assets in space from cyber attacks presents defenders with opposing truths similar to the those in the though exercise of Schrodinger's Cat.
(Image: CENA)By Amanda Lockwood, Melissa Sowerwine, and Doowan Lee
May 4, 2022
Dramatic increases in Chinese Communist Party use of information warfare capabilities to influence great power competition necessitates new approaches to training to counter those activities.
(Image: JP 3-13)By Scott Welles
May 3, 2022
Modern packet capture technology is bringing new capabilities to an old technique.
(Image: Axellio)By Mitchell Rubinstein
April 25, 2022
If you're not doing DevSecOps, you are dead in the water. Adversaries in cyber are moving ever-faster and DoD cybersecurity practitioners must catchup.
(Image: Audi and Business Insider)