As the Defense Department and Congress strive to streamline clumsy Authorization To Operate (ATO) procedures for software, the Pentagon also needs more computing infrastructure to test and experiment with new code.
By Sydney J. Freedberg Jr.The legislation proposes that if one office in the department officially deems a “cloud-based platform, service, or application” is sufficiently cybersecure to use, then all parts of DoD can accept this ATO.
By Carley WelchAll-source intelligence can be leveraged by artificial intelligence and machine learning to inform CONOPS like Joint All Domain Command and Control.
By Breaking Defense“We’ve heard you loud and clear on this within the DoD. I’m not going to say this is going to solve every bit of it, but it’s going to help us a bit,” Pentagon CIO John Sherman said.
By Carley WelchValuable intelligence insights can be gleaned from logistics or flight-test data when artificial intelligence or machine learning is applied.
By Breaking DefenseOSCAL’s goal is to enable compliance and security assessments to keep pace in complex, fast-moving, ever-changing DevSecOps environments.
By Brad D. WilliamsFor DoD multi- and hybrid-cloud environments, the ability to execute continuous Authority to Operate control is important in order to ensure that both cloud infrastructure and cloud-native applications are secure.
By Barry Rosenberg