“I can tell you at DoD, we’re taking this very seriously,” DoD CIO John Sherman said. “And we are committed to implementing zero trust at scale for our four-million-person-plus enterprise that we lead.”
By Jaspreet Gill“Since this is done in a virtualized environment that is hosted up in the cloud through DoD, it is very, very, very secure… We’re pretty excited about this and it’s taken us a while to get to this point, both from a policy perspective and from a building out of the environment [perspective], but we are right on the cusp of implementation,” Lt. Gen. John Morrison said.
By Jaspreet Gill“As far as reaching out to kind of the multinational world and the federal space, we haven’t yet, but that’s something that’s kind of on the roadmap for us to get to,” Drew Malloy, technical director for DISA’s cyber development directorate, said.
By Jaspreet GillFor DoD applications, 5G needs high levels of cybersecurity. Stand-alone 5G networks, like the Hughes network, are inherently more secure than older networks where 5G is added onto the existing network,” Rajeev Gopal, vice president, Advanced Programs, told Breaking Defense.
By Theresa HitchensThe memorandum pushes agencies to adopt zero-trust architecture implementation plans, cloud technologies, multifactor authentication and encryption.
By Jaspreet Gill“I hear more about IT revolution than evolution these days, but I think IT is more evolution,” DIA CIO Doug Cossa said.
By Brad D. Williams“The ultimate goal is understanding exactly what is happening on the network, who is connecting, what is connected, and what are those devices and users doing on the network so you can make sure that, where connection is necessary for a mission, it’s available but also that it’s secure,” Forescout’s Dean Hullings said.
By Brad D. WilliamsAn Army senior research scientist offers his suggestions on what to look for in a security orchestration, automation and response (SOAR) tool.
By Barry Rosenberg“If there’s one thing DoD and industry have done, it’s try a whole bunch of different tools over the last 10 to 12 years. What we have to do now is string them all together to show which ones work best for the capabilities the Army needs today and divest the ones that they don’t need,” Peraton VP Jennifer Napper said.
By Brad D. Williams“I will offer you there will be no sanctuary in the next fight. We have to have a resilient network,” Lt. Gen. John Morrison said.
By Brad D. Williams“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. WilliamsDiversifying space architectures and the need for interoperability is driving a shift to dynamic, flexible, software-based infrastructure.
By Barry Rosenberg“Joint always seems fun until we get into decisions about who governs this,” joked Army CIO Raj Iyer.
By Brad D. WilliamsThe new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. Williams