presented by
Exposing The Data Makes JADC2 Possible

Exposing The Data Makes JADC2 Possible
Exposing The Data Makes JADC2 Possible

Aligning current and emerging technologies for Joint All-Domain Command and Control is the enabler that will let warfighters acquire data and quickly act on it by applying effects where they need them, when they need to, and on the timeline they need them.

To Transform Tech, DoD Must Stop Being An ‘Innovation Tourist:’ Report

To Transform Tech, DoD Must Stop Being An ‘Innovation Tourist:’ Report
To Transform Tech, DoD Must Stop Being An ‘Innovation Tourist:’ Report

The current approach “is more akin to innovation tourism—with the DoD sampling the local fare of the United States’ various tech hubs—than a bona fide strategy for bringing emerging technologies into the department,” the report notes.

CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability

CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability
CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability

“CISA has validated various proofs of concept and is concerned that exploitation of this vulnerability may lead to full system compromise of agency networks if left unmitigated,” the emergency directive says.

presented by
Which Systems Can Be Improved With Better UX? All Of them.

Which Systems Can Be Improved With Better UX? All Of them.
Which Systems Can Be Improved With Better UX? All Of them.

“We have great technology, which is constantly being improved, but quite often the end user has been left to deal with the complexity of these systems,” said Visual Logic Partner Andy Van Fleet.

presented by
DevStar for B-21 Design, Build, Sustainment

DevStar for B-21 Design, Build, Sustainment
DevStar for B-21 Design, Build, Sustainment

Advanced software development techniques are reducing risk and will enable the Air Force and Northrop Grumman to more efficiently integrate weapons on future aircraft, like the B-21.

DoD Seeks $2.3B To Bolster US Chip Making

DoD Seeks $2.3B To Bolster US Chip Making
DoD Seeks $2.3B To Bolster US Chip Making

“From the DoD’s perspective, they’re highly dependent on [Asia] for fabrication and packaging [of chips],” Hudson Institute’s Bryan Clark tells Breaking Defense. This has led to DoD calls to address a “fragile and threatened” chip supply chain.

DoD Budget Requests Funding For Key Defensive Cyber Measures

DoD Budget Requests Funding For Key Defensive Cyber Measures
DoD Budget Requests Funding For Key Defensive Cyber Measures

The single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.

DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget

DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget
DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget

The budget requests funding for four new teams for the Cyber Mission Force. Those teams will support CYBERCOM operations and provide cyber support for space operations.

CISA Lacks Key Data On Colonial Pipeline Hack

CISA Lacks Key Data On Colonial Pipeline Hack
CISA Lacks Key Data On Colonial Pipeline Hack

CISA and FBI issue a joint advisory on DarkSide ransomware. “There is no immediate mission impact” from fuel shortage on DoD, a Pentagon spokesman said. Colonial temporarily restored operations between North Carolina and Maryland last night. Russia denies involvement. DarkSide’s business model complicates attribution.

JAIC Automates DoD’s Back Office: ‘From 20 Minutes To Seconds’

JAIC Automates DoD’s Back Office: ‘From 20 Minutes To Seconds’
JAIC Automates DoD’s Back Office: ‘From 20 Minutes To Seconds’

“We’re only as fast as our slowest process,” said JAIC’s Lane, who is applying AI, machine learning, automation, and other tech to boost DoD’s efficiency.

NSA Calls For Review Of Op Tech Security

NSA Calls For Review Of Op Tech Security
NSA Calls For Review Of Op Tech Security

Operational technologies, or OT, are prevalent in critical infrastructure environments. “Without direct action to harden OT networks and control systems against vulnerabilities… owners and operators will remain at indefensible levels of risk,” NSA says.

presented by
How Future Vertical Lift Will Help The Army Prepare For A Converged Battlespace

How Future Vertical Lift Will Help The Army Prepare For A Converged Battlespace
How Future Vertical Lift Will Help The Army Prepare For A Converged Battlespace

The Army’s Fight for Battlefield Control is Changing, Lockheed Martin is Leaning in with Innovation

presented by
No Cloud Is An Island

No Cloud Is An Island
No Cloud Is An Island

For DoD multi- and hybrid-cloud environments, the ability to execute continuous Authority to Operate control is important in order to ensure that both cloud infrastructure and cloud-native applications are secure.

presented by
Fast-To-Field Battlefield Mobility

Fast-To-Field Battlefield Mobility
Fast-To-Field Battlefield Mobility

The Army is looking to field better tactical vehicles by pulling forward the best commercial technologies.