“It should be more like an Apple Store experience,” said Lauren Knausenberger, Deputy CIO for the Air Force.
By Kelsey AthertonBecause open-source software lacks the same kind of cyber certification that comes with more sensitive information, it is fertile ground for start-ups looking to work on military data, provided each service makes an open-source library available.
By Kelsey AthertonDue out this fall, the Zero Trust Reference Architecture is about upgrading cybersecurity in existing systems, without buying all-new tech. The Army is enthusiastic – mostly.
By Sydney J. Freedberg Jr.The Joint Artificial Intelligence Center needs three things: new acquisition authorities, more staff, and the cloud. With JEDI delayed ‘potentially many more months,’ director Lt. Gen. Jack Shanahan said, he’s turning to an Air Force alternative.
By Sydney J. Freedberg Jr.“If you know your enemies and know yourself, you will not be imperiled in a hundred battles.” Guess which half of Sun Tzu’s ancient maxim is the Pentagon’s problem?
By Theresa Hitchens“In our defeat-ISIS activities, we’ve had a struggle and presently continue to struggle with the challenge of open source and publicly available information, and how we leverage that to make it truly useful for the warfighter,” Jospeh Votel, former head of both Special Operations Command and Central Command.
By Barry RosenbergNATIONAL HARBOR: A key capability the Defense Department has relied on since the late Andy Marshall invented it — Net Assessment — is coming to the Intelligence Community. But wait, you say. Doesn’t the National Intelligence Council do long range strategic analysis? Well, not nearly as far out as Net Assessment does, which is 20…
By Colin ClarkAir Force Space Command deputy Maj. Gen. John Shaw says the US probably won’t be using piloted Tie Fighters in future space wars. But…
By Theresa HitchensA Pentagon task force is reviewing over a hundred tools and services to speed up software acquisition.
By Barry RosenbergDISA has identified 46 factors that could be used to help it get rid of passwords on your mobile device, including gait, the way you swipe, and how you hold your phone or tablet.
By Barry RosenbergThe existing, expensive network can’t do what the Army needs. So is the solution outsourcing to the private sector?
By Sydney J. Freedberg Jr.“We’re going to turn that off unless you secured that properly. Whoa! That’s a very different mindset,” Col. Straub told me. “The availability of the network versus the defense of the network, that’s something we’re trying to get commanders to think about.”
By Sydney J. Freedberg Jr.WASHINGTON: In the face of a lot of what he called “catastrophizing” about the “very volatile time for the country” known as the presidential transition, Director of National Intelligence James Clapper offers a simple message: “It’ll be OK.” Of course, that reassurance came after Clapper outlined the dark precautions that are taken on Inauguration Day, including the designation of…
By Colin ClarkCAPITOL HILL: The Quadrennial Defense Review is dead. Long live a unified combatant command known as Cyber Command. Ok, it doesn’t quite ring like Long Live The Queen, but you get the idea. House Armed Service Committee staffers briefed reporters on some of the more important bits of the 2017 National Defense Authorization Act. Top…
By Colin Clark and Sydney J. Freedberg Jr.