The civilian internet firm will build prototype software for Tactical Identity Credential & Access Management, a critical step in bringing “zero trust” cybersecurity to battlefield networks.
By Sydney J. Freedberg Jr.The report, without “controlled unclassified information” redactions, discusses concerns with major weapons programs from ships to planes to hypersonic missiles.
By Jaspreet Gill, Theresa Hitchens and Justin Katz“As far as reaching out to kind of the multinational world and the federal space, we haven’t yet, but that’s something that’s kind of on the roadmap for us to get to,” Drew Malloy, technical director for DISA’s cyber development directorate, said.
By Jaspreet Gill“The ultimate goal is understanding exactly what is happening on the network, who is connecting, what is connected, and what are those devices and users doing on the network so you can make sure that, where connection is necessary for a mission, it’s available but also that it’s secure,” Forescout’s Dean Hullings said.
By Brad D. Williams“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams“Joint always seems fun until we get into decisions about who governs this,” joked Army CIO Raj Iyer.
By Brad D. WilliamsThe new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. Williams