Welcome to Defense One

Introducing a new publication for a new era. By Kevin Baron

Letter from the Editor:
A New Publication for a New Era

Welcome to Defense One, a new digital publication from Atlantic Media Company and an entirely new concept for national security coverage. Defense One is a news site that will go deeper, featuring reporting, analysis and bold ideas about the trends that are driving the future of defense and U.S. national security.

The transformation from the post-9/11 decade of war into a new 21st century global security era has begun. With an open-door policy to new and innovative voices, my hope is that Defense One will be a news and conversation destination for the national security leaders, influential professionals, stakeholders and citizens who are navigating that change.

Defense One will deliver a daily mix of stories by award-winning journalists and useful, insightful commentary across the entire national security spectrum — from politics and procurement to global affairs and ground troops. Expect breaking analysis on the top news events of the day to run alongside deeper dives that shine a critical light on lesser-known facets of a national security world that most never see. Look for a range of voices from senior leaders in Washington to commanders abroad and next-generation thinkers far from the political scrum.

We will focus on the global threats commanding the U.S. military’s attention, the domestic and international politics of security, management of the government’s largest institutions and agencies through this transitional period and the influence of rapidly advancing technology on defense strategy. Finally, an entire channel of Defense One is devoted to one thing: Ideas. There, nothing is sacred. The stakes are too high for holding back.

The dedicated team at Government Executive Media Group has exceeded its own expectations, and certainly mine, with a simply stunning website that is responsive to mobile devices and incredibly engaging for users whether on a phone, tablet or computer. We’ll use that platform as a new space for innovative thinking about what is driving and shaping the U.S. national security community into this new era.

I cannot overstate how proud I am to present to you: Defense One.

Kevin Baron
Executive Editor

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.