The DoD has been seeking white papers from vendors with plans for cloud-based systems that would effectively permit continued use of necessary internet connectivity but cut off public web access in a way that closes doors on most access points for hackers. Through the proposed system, all browsing would be
“Homeland Security Secretary Kirstjen Nielsen and Defense Secretary Jim Mattis spearheaded an agreement signed last week about how their agencies will work together on future cybersecurity challenges, Homeland Security Undersecretary Chris Krebs said last week. The pair is also urging more cyber cooperation between military and civilian government, Krebs said.
“The Pentagon’s first-ever audit discovered major flaws in how it handles IT processes and challenges with its internal tracking databases, but did not discover any major cases of fraud or abuse. The audit — long sought by Congress and good-government groups — was unveiled Thursday evening. The effort covered $2.7
The U.S. is preparing to draw down in Africa in order to concentrate on broader geopolitical threats. ‘As the department implements the [National Defense Strategy] to maintain our global military advantage, we are moving to a more resource-sustainable approach with our counter violent extremist organization campaign,’ Pentagon spokeswoman Navy Cmdr.
“The U.S. Department of Defense ‘failed’ its first-ever audit, expected to be released Thursday, according to its No. 2 official. But Deputy Secretary of Defense Patrick Shanahan isn’t surprised at the result, saying it was widely expected the audit would find issues. A 1990 law passed by Congress required audits
“Department of Defense leaders have disabled a secure file sharing system due to security risks and have not set a date to reinstate the technology. The Army Aviation and Missile Research Development and Engineering Center Safe Access File Exchange, or AMRDEC SAFE site was disabled as a preventative measure after
“In yet another contract allowing outside hackers to test systems for vulnerabilities, the Department of Defense is opening the doors to more sensitive systems. In the past the bug bounties, as they’re known, focused on public-facing DoD websites. They allow vetted hackers to search for vulnerabilities for cash payouts that
“The Islamic State’s 2014 invasion of Iraq, military futurist Peter Singer writes, ‘was launched with a hashtag.’ #AllEyesOnISIS became a viral propaganda machine that inspired followers, generated bots and is credited in part with driving enough fear to lead thousands of U.S.-trained and equipped Iraqi forces to abandon their posts.
New DoD/Rand report populates searchable, predictive database on sexual assault in the U.S. military
The U.S. Department of Defense recently released a study on sexual assault in the U.S. military. The data it generated from over 170,000 survey responses has formed the basis for all kinds of statistics broken down by gender, location, and service branch, allowing analysts to project the likelihood that any
The Department of Defense has released its first new cyber strategy document since 2015. The document affirms that the U.S. “cannot afford inaction,” and that U.S. cyber operations must more “amplify military lethality and effectiveness” more offensively. Defense officials conducted a review of the department’s cyber capabilities and strategy that