AI has the potential to accelerate operations, but this raises a new challenge: how to keep humans in the loop when AI can ...
Cybersecurity borrows many of its concepts and strategies from the military domain. For instance, Lockheed’s famed Cyber Kill Chain is the cyber adaptation of the military kill chain, which identifies ...
Data leaks, breaches, and cyberattacks are becoming the norm, spawning discussions on how organizations can effectively defend themselves against an ever-evolving threat landscape. With the modern ...
As a third-generation executive of a family-owned printing business, I’ve had the good fortune to access incredible mentors and advisers who have bestowed amazing advice. Their counsel has followed me ...
With over 240,000 staff under his watch and $32 trillion in assets a day to safeguard, it's no wonder Jamie Dimon runs a tight ship at JPMorgan Chase. On top of that, financial institutions have had ...
Much has been written about maneuver in various domains of conflict—land, sea and air. As in many other fields, the thinking owes much to the late Col. John Boyd, USAF, who is well known for his ...
Editor’s Note: This article previously appeared in a different format as part of The Atlantic’s Notes section, retired in 2021. I was glad to see that, in an item yesterday called “The Way of the ...
Work is needed to improve temporal, spectral and information understanding within the layers of the cyber domain to facilitate useful cyber-spectral and information maneuver. These advances could be ...