Partnerships are growing from disparate groups in search of the same goal.
Compliance with Defense Information Systems Agency rules are a must. Break the rules, and companies can lose their applications or have systems removed from the network.
Ongoing changes in the tactical networks—the mobile battlefield—should provide the U.S. Cyber Command with an increased ability to discover and address vulnerabilities in these networks.
Ongoing budget cuts place the Defense Department in a challenging situation, tasked with continually supporting warfighters on an increasingly tight budget. The most direct route for the department to accomplish mission goals and support warfighters is through information technology innovation.
In large federal organizations, tension always exists between local and central personnel who have different priorities, available resources and levels of control. In the U.S. Defense Department, that tension is especially apparent between the information technology professionals at the local level and the folks who oversee all of an agency’s operations.
Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.
For years, the Defense department took a “do it alone” posture when it came to sharing information and protecting its networks and communication infrastructures from security attacks. Now in an interconnected world of reduced budgets and ever-increasing security risks, the DOD is fundamentally changing the way it approaches information sharing and cybersecurity.
The latest Incoming column from Lt. Ben Kohlmann, USN, titled “Link Warfighters to Technologists at the Lowest Possible Level” (SIGNAL Magazine, April 2013), resonated with observations I’ve made and conclusions I’ve reached over the years. I’ve been involved with the research and development and acquisition communities for a long time, including serving as the Air Force chief scientist from 1999 to 2001. Perhaps my adding to Lt.
The current driving force in the military and defense environment is to keep legacy systems operating longer, or the replacement of legacy systems with new systems that emulate one or more legacy systems with commercial-off-the-shelf (COTS) technology. However, there is insufficient budget to fund development of these COTS systems, and the burden of development falls upon private industry. The current sequestration environment adds another burden on industry to perform to the needs of the military, but without the benefit of nonrecurring engineering (NRE) costs being reimbursed.
The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate.
The Air Force Chief of Staff had but three critical requirements for the Joint Direct Attack Munition (JDAM): "It should work; it should hit the target; and it should cost under $40,000 each." If only every requirements document could fit on a sticky note!
For those who have lost their lives and for the Wounded Warriors that now have long roads to recovery, we owe them the homage and the support they ultimately deserve.
We are drowning in health care data, but remain thirsty for information. Driven by federal incentives, public and private healthcare institutions have generated billions of electronic health records (EHRs), rich with clinical and demographic data. This data can be aggregated and analyzed to improve scientific research, drug safety and overall public health. However, the growth in health care data is so fast that issues surrounding data storage, integrity, modeling and sharing can diminish its tremendous potential. Guest blogger Roger Foster of DRC looks at this important health IT issue.
From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.
Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.
"Let's do lunch?" is a phrase many mock; others use it as much as possible to gain invaluable insight from personal experiences and get feedback about present actions and future aspirations. As an intern, I have a limited perspective of the Department of Defense and rely heavily on the guidance of others when contemplating different career ideas, experience opportunities and developmental paths or programs to pursue.
We presently are experiencing intense pressure not to raise the debt ceiling, prophecies about the downfall of government IT, more legislators considering reducing the once-sacred defense budget, and prophecies of gloom and doom relating to government programs in general. Despite this, a number of leaders and real change agents both in government and outside government offer us some real hope and shining examples.
The president and CEO of the USO of Metropolitan Washington encourages everyone to remember our troops and their families as we celebrate our nation's independence.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.