The Army is holding back some of its soldiers from more advanced cyber training to keep them around.
The Air Force isn’t waiting for DoD’s JEDI procurement before it starts moving its applications to commercially-operated cloud environments. DISA’s milCloud 2.0 is among the options its found to be surprisingly attractive.
Defense Collaboration Services wants to move to MilCloud 2.0 by October.
DoD needs to take into account data management and security as it migrates to cloud.
A May 7 memo from the Defense Department’s chief information officers gives “fourth estate” agencies until 2020 to migrate applications from more than 100 data centers.
All organizations must manage their data in order to accomplish their missions. An enterprise approach to data management can help DoD agencies reduce the complexity of their IT environments and enable real digital transformation, allowing them to protect and extract value from their information.
The Pentagon’s chief information officer’s office spearheaded the development of the ITSA tool as part of its data center consolidation effort.
John Hale, DISA’s chief of enterprise applications, said his office is helping the military services and agencies do the hard work before moving to the cloud.
The U.S. military is employing a mixture of procurement contracts and innovative practices to speed up the acquisition of defensive and offensive cyber technology.
The Army’s new framework for a rapid process to acquire cyber defensive tools is a good example of how DoD acquisition systems are about providing the warfighters as much capability as possible.
National Guard units are ramping up their defensive cyber capabilities across the board, and will soon be able to quickly respond to cyber attacks in their home states and territories.
U.S. Transportation Command (TRANSCOM ) has tested a few off-the-shelf transportation management systems, and is in negotiations to buy one to help streamline its legacy systems.
The Army and Navy have begun releasing these Cyber Mission Forces (CMF) into the wilds of their network protection efforts.
Unlike their civilian agencies, U.S. defense agencies responsibilities include dealing with asymmetric threats — hostile adversaries using commercially available technologies that, in many cases, are far superior to what the government has on hand.