Search

Search results

  1. Can Military Data Be Secure, Trusted and Mobile?

    ... not providing a fluid, agile stream of information that the DOD needs to perform everyday missions. While data may successfully be ... University of Pittsburgh Institute for Cyber Law, Policy and Security. Mobile devices used to be a peripheral accessory; now they have ...

  2. Services Ponder How to Train Like They Fight for Cyber

    ... and ineffective, and a unity of command across all DOD components was needed. Since then, DOD stood up an operational headquarters ... don’t get another chance, if we don’t have our defensive security set in place.” Therefore, the military needs persistent cyber ...

  3. ManTech to Support Analysis of Future of U.S. Air Force Warfighting

    ... and Assessments Directorate (AF/A9) for support on the DoD Information Analysis Center's (DoD IAC) Cyber Security Technical Area Task (CSTAT) Multi-Award Contract (MAC). The AF/A9F ...

  4. Budget Constraints, Technology Needs Challenge Marine Corps

    ... Congress. Lawmakers’ inability to approve a budget for DOD, instead relying on continuing resolutions, “really does make it hard to ... and speed up procurement of needed gear without sacrificing security. One of the priorities the Marine Corps has been working on for ...

  5. SIGNAL Coverage: DCOS 2017

    ... Conquering cyberthreats that pose a national security risk means acquiring cutting-edge technology and leading-edge talent and pairing them.   Speed or Security? DOD Needs Both The future for the U.S. Defense ...

  6. Awareness and Collaboration Can Improve FITARA Scorecard

    ... Labor; the Office of Personnel Management; and the Social Security Administration. “This is not a checkbox exercise,” says David ... He sees software as the key to innovation in the DOD space. “Software is driving the mission capabilities of the Defense ...

  7. DOD Seeks Sources on Cybersecurity, C4, IT and Data Analytics

    ... drive secure information enterprise services; assist in DOD IT investment analysis; strengthening cybersecurity; and command, control, ... the Joint Information Environment and the Joint Regional Security Stacks. In addition, the department seeks vendors capable of ...

  8. Going Mobile: Technology Policy Changes to Help DOD Go Full-Throttle

    ... technology advances, particularly in areas of automation and security management. With mobile no longer a fringe idea, troops want to avail ... and unclassified systems, it also seeks to revamp its acquisition processes to buy and field technologies well before they become ...

  9. A Pathway to More Resilient SATCOM

    ... enterprise technology at San Diego’s Kratos Defense and Security Solutions . But, he says, “At the end of the day, those are just a ... Lober submits. “But just like they went away from the DOD telephone system in the ’60s and the cellular system in the ’80s, I ...

  10. A Successful Rest of 2017 Should Include 4 IT Resolutions

    ... applications and data sets. With hybrid cloud, the DOD can retain greater control and security when necessary, while still enabling the flexibility of cloud.  ...

Pages