

DISA plans to first achieve federated ICAM connection within the Army, followed by the Department of the Navy and Department of the Air Force.
By Carley Welch
“We’re not the only target that damn communists are trying to overcome,” Col. Gary Kipe said Wednesday. “They’re trying to overcome freedom loving people around the world, and all of us are using the same data.”
By Carley Welch
“This constrained, highly dynamic, and adversarial-susceptible tactical environment will be a challenge to implement ZT solutions that meet mission needs,” the RFI stated.
By Carley Welch
“It is key to unlocking the modern capability that we all crave within our Department of Defenses and our alliances,” acting Pentagon CIO Leslie Beavers said.
By Carley Welch
The move will “not only deliver that network, but everything that’s going through that network, and then making sure everything that goes through that network is protected,” Gen. Jacqueline McPhail, commanding general of NETCOM, said.
By Carley Welch
The civilian internet firm will build prototype software for Tactical Identity Credential & Access Management, a critical step in bringing “zero trust” cybersecurity to battlefield networks.
By Sydney J. Freedberg Jr.
- Air Warfare, All Domain, Congress, Land Warfare, Naval Warfare, Networks & Digital Warfare, Pentagon, Space
Pentagon’s annual weapon test report reverses classification, details major program challenges
The report, without “controlled unclassified information” redactions, discusses concerns with major weapons programs from ships to planes to hypersonic missiles.
By Jaspreet Gill, Theresa Hitchens and Justin Katz
“As far as reaching out to kind of the multinational world and the federal space, we haven’t yet, but that’s something that’s kind of on the roadmap for us to get to,” Drew Malloy, technical director for DISA’s cyber development directorate, said.
By Jaspreet Gill
“The ultimate goal is understanding exactly what is happening on the network, who is connecting, what is connected, and what are those devices and users doing on the network so you can make sure that, where connection is necessary for a mission, it’s available but also that it’s secure,” Forescout’s Dean Hullings said.
By Brad D. Williams
“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams
“Joint always seems fun until we get into decisions about who governs this,” joked Army CIO Raj Iyer.
By Brad D. Williams
The new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. Williams