Click on the image below to see our most recent issue:

Featured Articles

By Joe Billingsley

March 6, 2023

The 2023 National Cybersecurity Strategy lays the groundwork to increase cyber liability and cyber lawyers.

(Image: White House)

By Josh Baughman

January 17, 2023

The PLA Rocket Force is shifting to use Virtual Reality (VR) simulation in order to better prepare for war and increase their combat capability. A review of reports show how the Rocket Force is using VR to create a better prepared and more combat ready Rocket Force.  

(Image: PLA Daily)

By Brad E. Rhodes, Colonel, US Army Reserve

December 1, 2022

With the ubiquitous spread of internet connectivity, the influence of what our Reservists and National Guard members do through their Defense Support of Civil Authorities (DSCA) responsibilities and their support to homeland emergency response can and will influence perception of the American people. What can planners and commanders do to seize the initiative through information operations during these actions? 

(Image: Security Boulevard)

By Paul F. Renda

November 21, 2022

What can we learn about the state of STEM education in the United States by comparing global metrics? 

(Image: oecd.org)

By Josh Baughman

October 21, 2022

China is building training exercises in the metaverse in order to increase their training and future combat capabilities. 

(Image: news.chine.com.cn))

By Morgan VanderLeest

August 19, 2022

Ransomware is an increasing threat to society, including against the United States’ critical infrastructure. At what point does the attack become an act of war instead of an unlawful act?

(Image: Kaspersky)

By Tomas Pena

May 6, 2022

Defending assets in space from cyber attacks presents defenders with opposing truths similar to the those in the though exercise of Schrodinger's Cat. 

(Image: CENA)

By Amanda Lockwood, Melissa Sowerwine, and Doowan Lee

May 4, 2022

Dramatic increases in Chinese Communist Party use of information warfare capabilities to influence great power competition necessitates new approaches to training  to counter those activities.  

(Image: JP 3-13)

By Scott Welles  

May 3, 2022

Modern packet capture technology is bringing new capabilities to an old technique. 

(Image: Axellio)

By Mitchell Rubinstein  

April 25, 2022

If you're not doing DevSecOps, you are dead in the water. Adversaries in cyber are moving ever-faster and DoD cybersecurity practitioners must catchup. 

(Image: Audi and Business Insider)

Past Issues