

Software-defined radios that fuse comms, electronic warfare, and SIGINT allow for rapid fielding and improvement of the kill chain.
By Breaking Defense
Sending robotic vehicles into the breach saves lives by removing humans from one of the most dangerous places on the battlefield.
By Barry Rosenberg
With multiple nuclear-capable threats and space itself being a contested domain, assured and protected MILSATCOM are more critical than ever before.
By Breaking Defense
Advanced technologies for tactical and strategic dominance.
By Israel Aerospace Industries
Cybersecurity leaders from the DoD CIO, USINDOPACOM, and APL discuss how they’re addressing the challenge in a Breaking Defense webinar.
By Barry Rosenberg
New programs like FLRAA and Optionally Manned Fighting Vehicle have a critical dependence on real-time data. “Time Sensitive Networking” is the answer.
By Breaking Defense
“The only way that we can actually do our job with the pacing threat of China is to actually add that automation capability,” said Brian Hermann, cybersecurity and analytics director at DISA.
By Carley Welch
“Fulcrum really represents the department’s shift towards leveraging technology and information technology as a strategic enabler,” Leslie Beavers, principal deputy CIO at the DoD said.
By Carley Welch
The use of computer vision and perceptive autonomy can have a profound impact on speeding the Observe, Orient, Decide and Act (OODA) loop.
By Breaking Defense
“We are moving forward, we’re hoping by the first quarter of calendar year [2025] we’ll be able to start enforcing this and putting this in contracts,” Dave McKeown, Deputy CIO for the DoD, said.
By Carley Welch
Join Breaking Defense for on-demand webinar on the latest trends and challenges in cybersecurity.
By Breaking Defense
All-source intelligence can be leveraged by artificial intelligence and machine learning to inform CONOPS like Joint All Domain Command and Control.
By Breaking Defense
Breaking Defense Q&A with James Fairbanks, Director of Operational Analysis and Threat Lab Group, BAE Systems
By BAE Systems
Counter-UAS, ISR sensors, autonomous platforms all depend on truly secure cloud computing.
By Breaking Defense