The Army’s new framework for a rapid process to acquire cyber defensive tools is a good example of how DoD acquisition systems are about providing the warfighters as much capability as possible.
National Guard units are ramping up their defensive cyber capabilities across the board, and will soon be able to quickly respond to cyber attacks in their home states and territories.
U.S. Transportation Command (TRANSCOM ) has tested a few off-the-shelf transportation management systems, and is in negotiations to buy one to help streamline its legacy systems.
The Army and Navy have begun releasing these Cyber Mission Forces (CMF) into the wilds of their network protection efforts.
Unlike their civilian agencies, U.S. defense agencies responsibilities include dealing with asymmetric threats — hostile adversaries using commercially available technologies that, in many cases, are far superior to what the government has on hand.
Replacing the DoD Information Assurance Certification and Accreditation Process (DIACAP) should let owners, operators and defenders of IT systems better manage risks.
The Navy wants a chief digital officer to better harness its data, but it’s plate is too full to follow through.
The Air Force’s Cyber Resiliency Office for Weapons Systems (CROWS) is assessing how the Air Force fields and sustains its weapons systems.
Currently, there is no firm timeline or hard transition deadline for moving to the cybersecurity scorecard 2.0, leadership says.
In its 2019 budget, the Air Force plans to fully stand up its new Chief Data Office, with funds to establish a new shared data environment and a trusted database of authoritative data sources.
Chris Cleary, director of business development and federal cyber strategy at Tenable, says industry needs to step up to the plate when it comes to providing the newest tech to DoD.