Wearing The Network To War
Posted on
Army foot soldiers are going into battle with more and more electronics, wirelessly networked both to each other and to distant command posts. So can GI Joe be hacked?
Commerce Expands Huawei Black List Beyond US Shores
Posted on
Nicholas Eftimiades, a former senior US senior intelligence officer, said the Trump Administration policy “is very surgical in its approach,” and will have only a “moderate impact” on allied countries.
Big Data On The Army Front Line: DCGS-A Upgraded
Posted on
The Army is upgrading its intelligence system to give forward commanders full access to the cloud — and work when the enemy takes the network down.
Lockheed Launches New Weapons Cybersecurity Strategy
Posted on
Hacking a spy satellite, stealth fighter, or smart bomb is very different from hacking a computer network, so the US military needs different defenses.
Unsafe At Any Speed: Multiple Vulnerabilities Afflict 5G
Posted on
The coming network needed for autonomous vehicles, virtual reality, and the Internet of Things will also bring cybersecurity danger.
A Secure Network Is Not Enough, Cyber Wargames Show
Posted on
If a hacker shuts off a base’s electricity or stops spare parts from arriving on time, they can sabotage a military mission without ever attacking a military network.
Change Or Scrap JEDI, Says IT Council
Posted on
An independent advisory group recommends the JEDI program be put on hold until the Defense Department’s cloud procurement plan is redone and syncs with the CIO’s cloud strategy.
NSA’s Cybersecurity Directorate Is ‘Back to the Future’
Posted on
The elevation of the cybersecurity mission to “it’s own Directorate raises its stature in NSA to a prominence that is absolutely needed,” says one former NSA official.
NIST Recommends Tightened DoD Contractor Security
Posted on
An interconnected ecosystem of primes, subs, suppliers, and partners mean one weak link can bring down the entire chain.