With its Golden Fleet initiative, the U.S. Department of the Navy (DON) is prioritizing speed, scale and execution. With shipbuilding and modernization efforts underway, the Secretary of the Navy ...
The U.S. Air Force Reserve announced a new direct commissioning effort designed to bring in cyber professionals from industry and enlisted ranks. The Cyber Direct Commission Program will add personnel ...
Building on Version 1 of the U.S. military’s so-called Bumblebee counter- drone system, the Joint Inter-Agency Task Force (JIATF) 401 began testing initial prototypes of the second iteration on April ...
In late 2022, the People’s Republic of China issued the world’s first deep fake regulation. The communist country sought to limit artificial intelligence creations, or deep synthesis, that went ...
The global security landscape has fundamentally transformed. The United States no longer enjoys unchallenged military and economic overmatch, while peer competitors—particularly China and ...
See which topics SIGNAL readers were most interested in this past year, from generative AI to cyber defense.
The Department of the Air Force (DAF) is on the hook for meeting the challenge of air- and space-related joint all-domain command and control. Having spent the last couple of years validating the ...
Among the most pervasive changes of the past 60 years has been the cost of living. No costs or salaries could remain static during six decades of capitalism, as 1946 saw the beginning of the removal ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
Never before has there been a holistic view of the nation’s cyber attack surface, by county. Thanks to researchers at the University of Maryland, counties can assess how vulnerable their IP addresses, ...
For years, the cyber domain was perceived as a virtual one. However, every cyber attack leaves a tangible footprint—a compromised server, a disrupted infrastructure or a breached supply chain. When ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results