Can DoD Develop Effective Cyber Deterrents?
While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.
The new agency takes over Federal security clearance reviews Oct. 1 and aims to apply automation and digitization to tackle a backlog that’s surpassed 500,000 investigations.
The Navy’s and Marine Corps’ enterprise IT program is preparing for a major generational update by planning to break down NGEN – its next-generation information technology program – into smaller pieces. By using a multi-phased acquisition approach, the NGEN-Recompete (NGEN-R) program aims to add choice and cut costs.
A decade after launching its Command Post of the Future, the Army aims for a more integrated battlefield command system that can push further toward the tactical edge.
What We’re Reading
Frank Kendall, the US undersecretary of defense for acquisition, technology and logistics, on the prospect of another continuing resolution, Congress’ proposal to use Overseas Contingency Operations funds to boost the Pentagon’s base budget, and DoD concerns with reform proposals.
One of the U.S. Air Force’s most important online portals is now running in the cloud.
MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.
Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).
The Department of Defense announced today that it has awarded a contract to HackerOne and Synack to create a new contract vehicle for DOD components and the services to easily launch their own ‘bug bounty’ challenges, similar to Hack the Pentagon, with the ultimate objective to normalize the crowd-sourced approach to digital defenses.
The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.
Many current and former federal employees who signed up for identity protection services after the cyber theft of their personal information soon will have to re-enroll to keep that coverage, administration officials said Monday.
There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.
The Army is getting up-to-date on cyber and electromagnetic activity policies, finally releasing the long-anticipated updated field manual for cyber and EW functions. The document, titled FM 3-12 “Cyberspace and Electronic Warfare Operations,” and dated for mid-April, though publicly released within the last week, replaces FM 3-38, which provided the initial guidance back in 2014.
When former Defense Department Chief Information Officer Terry Halvorsen talked about moving on from the Common Access Card (CAC) as the main approach to network authentication, many observers scoffed at the idea.
Halvorsen, who recently joined Samsung as an executive vice president focusing on mobile enterprise strategies and helping to navigate government and regulatory business affairs, envisioned and set as a goal last June for the next authentication technology to be more agile and less costly.