Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Nov 16, 2019 | Artificial Intelligence, automation, DOD, Future Workforce, Government, Machine Learning, Military, Politics, Projects, Radio Show, Radio_Show, Research, Robotics, safety, Science, Security, Technology, vehicles, Virtual Reality, Warfare, wearables
Future Defense and Military Tech Warfare is changing which means that the way we fight and the weapons we use will need to change. Much of the technology that we enjoy and use everyday, initially came from technology developed by and for the military and for space...
Nov 1, 2019 | Amazon, Big Tech, Business, Cloud, Cloud Vendors, DOD, Government, Internet, Microsoft, Military, Navigation, Networking, Radio Show, Radio_Show, Technology, Warfare
Cloud Players Vie for Pentagon Contract The Pentagon wants to make their data more accessible to their divisions no matter the location and began looking for a trusted Cloud Provider. They put out a bid for their Joint Enterprise Defense Infrastructure (JEDI.)...
Sep 28, 2019 | Civilian Employment, Cybercrime, Databases, DOD, Internet, Military, Radio Show, Radio_Show, scam, Technology, Veterans
Cybercriminals Target Veterans Looking for Civilian Employment Taking advantage of anyone is unacceptable. However, when it targets our warriors who are seeking civilian employment at the end of their military service, I find it infuriating. Cybercriminals set up an...