Knowledge Management & Information Sharing

Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct, and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes.

Articles

F
man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass…

F
Heidi Massey (left), chief of U.S. Army Sustainment Command’s G6 (Information Management) directorate’s Program Management Division, meets with an employee in her division. The Program Management Division is responsible for ensuring compliance... (Sarah Ridenour)

Effective, Efficient Communication Enables Logistics Capabilities for the Warfighter

ROCK ISLAND ARSENAL, Ill. – How many times a day do you join a video conference, take a phone call, send an instant message, or respond to an email? None of these communication capabilities would…

F
line of computer terminals

Everything You Always Wanted to Know About Large Language Models for Science (But Were Afraid to Ask)

Chat-GPT, DALL-E and other artificial intelligence (AI) tools based on large language models (LLMs) are causing seismic shifts in the way people create and communicate. Users can interact with these ​“chat bot” LLMs by asking…

Webinars

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

RESCHEDULED: Fundamentals of Cross-Domain Solutions in the DoD

THIS WEBINAR HAS BEEN RESCHEDULED FOR WEDNESDAY, FEBRUARY 21st at 12:00 PM ET A cross-domain solution (CDS) is a capability that can be used to securely connect discrete systems or networks, which may have different…

Events

AI generated image of warfighter figures operating on a circuit.

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

Soldiers from the 94th Army Air and Missile Defense Command, track an unmanned aerial systems (UAS) threat during a scenario as part of Black Dart 18 on Muscatatuck Urban Training Center, Indiana.

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Military Personnel operating computer next to military aircraft

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…