Innovation at Work: Can DoD Get Tech and Acquisition in Sync?

Technological innovation is out of sync with the pace of DoD acquisition. The Defense Department is working on a range of innovative solutions to to master this “clockspeed dilemma.”

Read More

What’s New

Can DoD Develop Effective Cyber Deterrents?

While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.

Navy to Re-Compete NGEN Piece by Piece

The Navy’s and Marine Corps’ enterprise IT program is preparing for a major generational update by planning to break down NGEN – its next-generation information technology program – into smaller pieces. By using a multi-phased acquisition approach, the NGEN-Recompete (NGEN-R) program aims to add choice and cut costs.

What We’re Reading

One of Air Force’s Most Important Unclassified Systems is Now in the Oracle Cloud

One of the U.S. Air Force’s most important online portals is now running in the cloud.

MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.

Electronic Threats from Above

Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).

Census Announces Test Plans for 2017, 2018

The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.

The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.

DISA’s Behind-The-Scenes Role in Hacking the Pentagon

The Defense Department has touted its “hack the Pentagon” bug bounty program, which is also the first in the federal government, as a wide success in appealing to the public to find network vulnerabilities. While led by the Defense Digital Service within the Pentagon, the Defense Information Systems Agency played a role in the success of this first-ever initiative as well and will continue to do so, officials said.