Defense Information Systems Agency

  • The Pentagon's main IT provider shuttered its large data center in Huntsville, Alabama. in May, leaving only 10 of its large Defense Enterprise Computing Centers in its inventory. The mission of those remaining DECCs, however, is growing, not shrinking.

    July 25, 2014
  • The Defense Information Systems Agency runs ten huge data processing centers around the world. That's down from 18 in 2008. The consolidation coincides with DISA taking on more and more responsibility for Defense IT. Federal News Radio's Jared Serbu has more on the agency's efforts to consolidate data centers, and what's still ahead. Read Jared's related story.

    July 24, 2014
  • Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.

    May 29, 2014
  • DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.

    May 27, 2014
  • When it comes to adopting mobile computing, the Defense Department moves about as fast as a Sherman tank in the mud. It wants to get things just right so mobile devices don't compromise network security. One hurdle for software vendors is the Security Technical Implementation Guide, or STIG. Without it, their stuff can't be used on DoD networks. Airwatch makes mobile device management software, and it just received STIG certification. Founder Alan Dabbiere joins the Federal Drive with Tom Temin and Emily Kopp to explain how the process works.

    May 23, 2014
  • John Hickey, the mobility program manager for the Defense Information Systems Agency, talks about the status of DoD's commercial mobile device programs, for both classified and unclassified communications. Greg Wenzel, a senior vice president at Booz Allen Hamilton, discusses the findings of a recent survey of government employees about DoD acquisition.

    May 07, 2014
  • Agencies must use only cloud services that have been approved under the Federal Risk Authorization and Management Program (FedRAMP) by June. OMB will receive more details on agency progress with the latest quarterly update through PortfolioStat. Meanwhile, FedRAMP's security baseline will be revised this summer.

    February 28, 2014
  • The Pentagon leverages the buying power of 2.6 million DoD personnel in the Air Force, Army and Defense Information Systems Agency in signing joint enterprise license agreement with CDW-G.

    February 18, 2014
  • Brig. Gen. Kevin Nally, the Marines Corps CIO, said the service is updating its network hardware and collapsing five unclassified networks into one. February 13, 2014

    February 13, 2014
  • Experts offer advice to small firms at the AFCEA NOVA event Tuesday to prosper in the federal marketplace.

    February 05, 2014
  • The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.

    January 22, 2014
  • The platform, called Acropolis, is initially being used only for network operations and cybersecurity data, but officials plan to expand it to help solve big data challenges around financial and acquisition information.

    January 15, 2014
  • Director of the Defense Research Projects Agency Director Arati Prabhakar says DARPA's budget wasn't decimated by sequestration, but it is being slowly eroded. The Office of Naval Research and the Marine Corps team up for technology demonstration. John Moniz, ONR program manager, says marines on the front lines can get real-time data using smartphones. At the recent AFCEA Mobile Symposium, Defense Information Systems Agency officials talk about mobile security possibilities.

    December 04, 2013
  • As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.

    November 25, 2013