May 13th, 2026
Autonomous AI Can Move Fast. Building Trust Must Move Faster To take advantage of agentic AI’s unbounded potential, organizations must build protections into both their infrastructure and data.
By: Dave Dimlich
President of SD3IT
Businesses and other organizations are lining up to take advantage of…

Blog
May 6th, 2026
Electronic Warfare and Spectrum Dominance: The Invisible Battlefield The RF spectrum is becoming a contested domain that impacts both military and commercial operations, driving the need for more resilient architectures and improved capabilities.
By: Dave Dimlich
President of SD3IT
Electronic warfare (EW) has been…
April 29th, 2026
How COTS Makes Zero Trust More Achievable The availability of capable COTS products helps streamline implementation and reduces the complexity of deploying a Zero Trust Architecture.
By: Dave Dimlich, President of SD3IT
and Steven Boyer, SD3IT Director of Emerging Technologies
Zero trust…
April 22nd, 2026
Space-Based Technology: The Next Frontier of IT Terrestrial Infrastructure For most companies, the key to effectively taking advantage of opportunities in space starts with integrating them as extensions of the enterprise.
By: Dave Dimlich, President of SD3IT and Dr. Renee Pizarro, Technology Solutions Director
For…
April 15th, 2026
The Expanding Drone Ecosystem Needs a Guiding Hand UAS are now central to warfare, as well as critical to a lot of other enterprises. The new technology is there, but government and industry need to improve manufacturing, supply chains and compliance regs to ensure that the best systems get put into…
April 8th, 2026
The Future of Virtualization in a Post-VMware World Broadcom’s takeover of VMware left customers with price hikes and oppressive subscription requirements, but they now have the opportunity to find workload-based solutions that can deliver better performance and solutions at lower costs.
By: Dave…
April 1st, 2026
Q-Day Is Closer Than You Think: What to Do Now to Prepare for Quantum-Safe Encryption Adversaries are already stealing encrypted information to decrypt later, and the full transition to quantum-safe encryption will likely take years. Organizations that haven’t started their transitions can’t afford to wait any longer.
By: Dave…
March 25th, 2026
Counter-UAS Technology Comes to the Fore in Battlefield Strategy Adversaries are deploying swarms of sophisticated, inexpensive attack drones. Defenders need to match them with layered CUAS that integrate the latest innovative technologies.
By: Dave Dimlich
President of SD3IT
As conflicts around the world are…

