The U.S. Defense Department now is advancing into the third generation of information technologies. This progress is characterized by migration from an emphasis on server-based computing to a concentration on the management of huge amounts of data. It calls for technical innovation and the abandonment of primary dependence on a multiplicity of contractors.
The move to the cloud offers great potential for U.S. Navy information technology efforts. Yet, other aspects such as applications and integrated capability sets must work their way into the sea service cyber realm.
Another Overhyped Fad
By Mark M. Lowenthal
Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), once observed that one of the peculiar behaviors of the intelligence community is to erect totem poles to the latest fad, dance around them until exhaustion sets in, and then congratulate oneself on a job well done.
Recent insider security breaches have put increased scrutiny on the U.S. intelligence community’s cloud computing plans. But cloud computing initiatives remain unchanged as the technology is expected to enhance cybersecurity and provide analysts with easier ways to do their jobs in less time.
As the intelligence community moves into the cloud, it launches the first step at the desktop level.
The U.S. Army Signal Corps is expanding the work its personnel conduct while dealing with technology and operational challenges that both help and hinder its efforts. On the surface, Army signal is facing the common dilemma afflicting many other military specialties—it must do more with fewer resources.
NATO is adopting an enterprise approach to networking so it can take advantage of new defense information system capabilities as well as recent developments gleaned from Southwest Asia operations. This approach would allow different countries participating in alliance operations to network their own command, control and communications systems at the onset of an operation.
When it comes to cloud computing, there are two items that are top of mind for Dave McClure, Associate Administrator with the General Services Administration (GSA) in Washington, D.C.
Government officials now admit they underestimated the scope and complexity of the federal data center realm.
In the coming months, the Defense Information Systems Agency (DISA) is expected to issue its multiaward contract for cloud computing services.
Rear Adm. Robert Day Jr., USCG, assistant U.S. Coast Guard commandant for command, control, communications and information technology, sees the Joint Information Environment as an opportunity to resolve some of the most pressing information technology problems in the years to come as he faces a future with more challenges and fewer resources. He says a military-wide common operating environment will establish “enterprisewide mandates that programs cannot ignore.”
The U.S. Navy uses a popular online collaboration tool to change course around last-minute travel restrictions.
The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.
Cyber Symposium 2013 Online Show Daily, Day 2
The Joint Information Environment (JIE) took center stage during the second day of the AFCEA International Cyber Symposium in Baltimore. The conference devoted one full panel to the joint environment, but presenters throughout the day stressed the JIE’s importance to the future of the U.S. military and coalition partners, discussed some of the challenges to achieving the vision and vowed that the department will make it happen despite any remaining obstacles.
The U.S. Air Force’s migration to a new enterprise network known as AFNET will be at least two years late in completion because the project turned out to be more complicated than planners anticipated.
A hand-picked group of Defense Department’s top information technology experts will work with a giant in the cloud computing industry to determine how security will play a part on the military’s migration to the cloud.
James Bond’s U.S. counterpart may be equipped more with commercial technologies than with systems developed in intelligence community laboratories. The private sector will be called upon to provide even more capabilities to help keep the intelligence community ahead of adversaries and budget cuts.
The term “big data” means different things to different people. To a bank, big data represents the ability to gain business intelligence from financial transactions. To the United States intelligence community, big data’s challenge comes in trying to sift through information from multiple environments in support of the warfighter.
A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.
The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns.