The Pentagon’s new cybersecurity strategy for the first time publicly addresses the department’s option to resort to offensive cyberwarfare tactics as a means to safeguard the military’s information networks. The Department of Defense Cyber Strategy, the second in four years, guides the development of the military’s cyber forces.
The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.
Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.
Bob Work has been confirmed as deputy secretary of defense, Pentagon, Washington, D.C.
Michael Dumont has been assigned as deputy assistant secretary of defense for policy (Afghanistan, Pakistan and Central Asia), Washington D.C.
For years, the Defense department took a “do it alone” posture when it came to sharing information and protecting its networks and communication infrastructures from security attacks. Now in an interconnected world of reduced budgets and ever-increasing security risks, the DOD is fundamentally changing the way it approaches information sharing and cybersecurity.
The Johns Hopkins University Applied Physics Laboratory (JHU/APL), Laurel, Md., is being awarded a five-year, sole source, cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity, task order contract for research, development, engineering, and test and evaluation for programs throughout the Defense Department.
On Wednesday, the Defense Department (DOD) issued its long-awaited cloud computing strategy. Officials also announced in a memo from Teri Takai, chief information officer for the DOD, that the Defense Information Systems Agency (DISA) will oversee the new strategy as "enterprise cloud service broker."
This free app allows Defense Department personnel and contractors to host and attend meetings from Android devices and tablets, giving users greater flexibility at work.
The U.S. Defense Department has revamped its Telework Program for the civilian work force. Leaders at each Defense Department component now are required to promote telework within their organizations and to take all possible steps to overcome artificial barriers to program implementation.
The U.S. Defense Department has awarded $18 million to six programs to reduce the energy demand of future expeditionary outposts. The funds are for programs aimed at developing and rapidly transitioning energy technologies for the combat force.
Consolidation and standardization will be key facets of future network operations, according to Teri Takai, Defense Department CIO.
The U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist.
The Pentagon has begun to reassign some organizations within the U.S. Joint Forces Command (USJFCOM) as part of its planned shutdown as a four-star combatant command later this summer.
The Defense Department's FY 2012 budget proposal features $2.3 billion for improved cyber capabilities, according to figures released this afternoon. Key elements of that funding include $0.5 billion for the Defense Advanced Research Projects Agency (DARPA) to invest in cyber technologies. Funding also will be provided to the Defense Information Systems Agency (DISA) for cyber identity, monitoring and enforcement.
Apps for iPhone and Android provide definitions for more than 150,000 military acronyms and abbreviations.
In less than 30 days, the Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.
Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.
On the heels of an announcement from U.S. Secretary of Defense Robert M. Gates where he proposed eliminating the positions of assistant secretary of defense for networks and information integration along with the J-6, the push to make the Defense Department more efficient continues. The INVEST Awards contest will reward the 25 best ideas submitted by department employees with cash prizes.