
Artificial Intelligence, Cloud Computing can Provide Big Cybersecurity Boost
The Department of Defense has an opportunity to rethink its traditional approach to protecting operational technology systems.
The Department of Defense has an opportunity to rethink its traditional approach to protecting operational technology systems.
Applying the zero trust approach to information technology is familiar territory, but applying it to operational technologies is fundamentally different—and far more complex.
Technology now empowers us to precisely attribute the source of attacks. failing to respond is tacit acceptance of current and future attacks. We must escalate deterrence measures along with implementing cyber defenses.
The AUKUS agreement introduces a significant risk: the potential for cyber threats exploited by adversarial nation-states or others opposed to the mission of AUKUS.
The capability of the Chinese cyber actors has grown, and the last couple of years have taught us that countries with adversarial interests are willing to change their strategy and deploy aggressive actions.