A new Defense Department (DoD) Risk Management Framework (RMF) – due to be delivered to agency leaders in roughly seven weeks – will have strong implications for the way the department’s cybersecurity professionals perform their tasks, according to John Bergin, IT and Business System Reform Lead at DoD. […]

While the White House’s proposal to reorganize the functions of many Federal agencies made the biggest headlines today with major steps like the proposed merger of the Departments of Education and Labor, the lengthy proposal document released today also touches on a host of other significant issues including the Federal cybersecurity workforce, delivery of government services to citizens, and handling of background checks for Federal Employees.






[…]

With the Department of Veterans Affairs (VA) formally signing on last month to adopt the same electronic health records system as the Department of Defense (DoD), the two agencies are putting a lot of chips on a solution to a problem that history suggests is pretty risky.






[…]

Military users will soon see a tenfold boost in the Department of Defense’s telecommunications network, in a move that will support the service’s combatant commands, the Joint Information Environment (JIE), and in the process, DoD’s push toward commercial cloud services.






[…]

The U.S. Cyber Command is ready for its close-up. The command announced May 17 that all 133 of its Cyber Mission Teams are fully operational, capping a roughly one-month stretch that saw the arrival of a new commander, the opening of a new operations center, and the official designation of Cybercom as a full unified combatant command.






[…]

The Pentagon wants more hackers to take aim at its systems, launching another program that invites crowdsourced attacks from outside the Department of Defense (DoD) to help it identify and mitigate vulnerabilities in its networks and information systems.






[…]

You can hear the clatter from the White House as it hammers out the details of a long-awaited national cyber security strategy. But, the Department of Defense (DoD) cyber policy strategists are writing out advice to keep Federal agencies safe from hackers’ webs today.






[…]

The Government Accountability Office–GAO–recently released a report on an artificial intelligence forum it held in Washington, D.C. last summer. It shows that government’s thinking about the ups and downs of thinking machines. Two highlights to make you think. 






[…]

As Department of Defense (DoD) officials testified before the Senate last week on the Pentagon’s consolidated financial audit, John Gibson, the DoD’s chief management officer, spoke on the vast potential for shared services to improve department efficiency.






[…]

The Department of Defense (DoD) on Wednesday sketched out plans for a swift, multibillion dollar move to a comprehensive cloud infrastructure, while leaving a lot of the details to be filled in along the way.






[…]

The Defense Information Systems Agency (DISA) has completed the transition of the Secret Internet Protocol Router Network (SIPRNet) to a virtual network, which increases its bandwidth tenfold, while supporting plans to extend SIPRNet to the very edges of the network via the commercial cloud.






[…]

With the passion of an evangelical, Deputy Defense Secretary Patrick Shanahan preached the Defense Department’s (DoD) “uncompromising” approach to cybersecurity last month at the AFCEA West conference in San Diego. And, his sermon included spreading the responsibility for cybersecurity to industry as a condition of winning contracts.






[…]

Reports like December’s White House IT Modernization Report sometimes seem like they impose requirements on agencies from above. Speaking at the ServiceNow Federal Forum in February, Danielle Metz, a policy advisor at DoD Office of Science and Tech Policy and contributor to the Modernization Report, gave us a look inside the kitchen to see how these reports come together.






[…]

Artificial intelligence has been applied to everything from cybersecurity and financial management to human resources and self-driving cars, so it seemed only a matter of time before it could take over video surveillance duties. And while AI, machine learning, and neural networks have made some promising strides in this area, it’s not quite the slam dunk that it might seem.






[…]

1 2 3 4