As debate swirls around the Department of Defense’s (DoD) multibillion dollar Joint Enterprise Defense Infrastructure (JEDI) cloud acquisition, the department’s push toward commercial cloud services is continuing on other fronts. […]

John Bolton, President Trump’s national security adviser, may not be hunting for a replacement for Rob Joyce, the current White House cybersecurity coordinator, who previously announced he would leave his post and return to the National Security Agency later this month.






[…]

Army Lieutenant General Paul Nakasone is taking over this afternoon as chief of U.S. Cyber Command and director of the National Security Agency.  At the same time, U.S. Cyber Command is being elevated to the level of a full unified military command, the Defense Department said today.






[…]

You can hear the clatter from the White House as it hammers out the details of a long-awaited national cyber security strategy. But, the Department of Defense (DoD) cyber policy strategists are writing out advice to keep Federal agencies safe from hackers’ webs today.






[…]

Users have the reputation of being the weakest link in cybersecurity, because of their potential to undo the most fortified cyber setup with an exposed password or absent-minded click in a phishing email. They’re the guy who forgets to lock one door in an otherwise secure building, or the kid who unwittingly reveals where the family keeps an emergency house key.






[…]

The Air Force has awarded five small businesses contracts that could top out at $950 million for the rapid development of new cyber capabilities. This contract continues an effort by the service, and the Department of Defense overall, to keep up with potential adversaries in the fast-changing cyber domain.






[…]

The Pentagon’s vision of future warfare involves teams of small autonomous and semi-autonomous unmanned vehicles–in the air, on the ground, and in the water–operating in coordinated swarms to support troops on the battlefield.






[…]

The Pentagon is a very large building that houses a lot of the authorities for the U.S. Military. It's big. This photo doesn't do it justice, but they're kinda rightly concerned about people flying drones around there.

In another example of how far the cyber domain is pervading every aspect of warfare, military units are beginning to add cyber protection testing to vehicles before they hit the road.






[…]

Bot-driven cyberattacks and other fast-spreading malware have been making some pretty big waves of late. The Mirai botnet, for example, launched several record-setting Distributed Denial-of-Service–DDoS–attacks starting in September 2016.






[…]

The Department of Defense (DoD) Empire just struck back with answers to more than 1,000 questions that vendors posed regarding the Joint Enterprise Defense Infrastructure (JEDI) cloud contract. DoD just released its second draft request for proposal after responding to concerns of 46 vendors and two associations.






[…]

A new award program, that recognizes Federal agencies that turn citizens’ frowns upside down, debuts in May. The Service to the Citizens awards, founded by Martha Dorris, everybody’s favorite former govie and a lady that always makes me smile, honors Feds for service to citizens and citizen experience breakthroughs.






[…]

The world over, folks ask the same two questions every day–what’s for dinner, and what’s the weather forecast? In the government IT space, every day we’re all asking about the cloud forecast. A recent report from P&S Market Research provides new insights on the global government’s cloud appetites.






[…]

The Navy’s IT operations have a new sheriff, in the form of a chief management officer whose arrival makes the high-profile Department of the Navy Chief Information Officer a thing of the past.






[…]

The Department of Defense (DoD)–has recruited a new CIO–Dana Deasy. The former CIO at JPMorgan Chase & Co., Mr. Deasy is expected to report for duty in early May.






[…]

The Department of Defense is splitting up and reorganizing its acquisition system in an effort to keep up with the times. A changing threat landscape and a new world order in how technology is developed, and business is conducted is behind the shift, according to DOD officials.






[…]

The Army recently added 18 more vendors to its $250 million Army Cloud Computing Enterprise Transformation (ACCENT) contract, which kicked off last year with 50 vendors certified as meeting the Army’s requirements for cloud services.






[…]

The U.S. military has long laid claim to having the best-equipped, best-trained fighting force in the world, and to spending more on defense than the next eight top-spending nations combined. But when the battleground is cyberspace, does that claim hold up?






[…]

The tactics of warfare aren’t what they used to be. In addition to asymmetric battlefield tactics that differ from conventional battles, they also can include cyber, social, economic, and psychological strategies that don’t necessarily involve physical combat or destruction–or even direct human involvement–and can’t be divined by tracking troop movements or fleet deployments. As a result, the signs of impending war aren’t what they used to be either.






[…]

1 39 40 41 42 43 54

Categories