The current approach “is more akin to innovation tourism—with the DoD sampling the local fare of the United States’ various tech hubs—than a bona fide strategy for bringing emerging technologies into the department,” the report notes.
By Brad D. Williams“CISA has validated various proofs of concept and is concerned that exploitation of this vulnerability may lead to full system compromise of agency networks if left unmitigated,” the emergency directive says.
By Brad D. Williams“From the DoD’s perspective, they’re highly dependent on [Asia] for fabrication and packaging [of chips],” Hudson Institute’s Bryan Clark tells Breaking Defense. This has led to DoD calls to address a “fragile and threatened” chip supply chain.
By Brad D. WilliamsThe single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.
By Brad D. WilliamsThe budget requests funding for four new teams for the Cyber Mission Force. Those teams will support CYBERCOM operations and provide cyber support for space operations.
By Brad D. WilliamsCISA and FBI issue a joint advisory on DarkSide ransomware. “There is no immediate mission impact” from fuel shortage on DoD, a Pentagon spokesman said. Colonial temporarily restored operations between North Carolina and Maryland last night. Russia denies involvement. DarkSide’s business model complicates attribution.
By Brad D. Williams“We’re only as fast as our slowest process,” said JAIC’s Lane, who is applying AI, machine learning, automation, and other tech to boost DoD’s efficiency.
By Brad D. WilliamsOperational technologies, or OT, are prevalent in critical infrastructure environments. “Without direct action to harden OT networks and control systems against vulnerabilities… owners and operators will remain at indefensible levels of risk,” NSA says.
By Brad D. WilliamsThe Army’s Fight for Battlefield Control is Changing, Lockheed Martin is Leaning in with Innovation
By Lockheed MartinFor DoD multi- and hybrid-cloud environments, the ability to execute continuous Authority to Operate control is important in order to ensure that both cloud infrastructure and cloud-native applications are secure.
By Barry RosenbergThe Army is looking to field better tactical vehicles by pulling forward the best commercial technologies.
By Breaking Defense