Cyber Security
The website seeks to scale the Defense Department’s bug bounty program by attracting additional white hat hackers. The Defense Department’s Directorate for Digital Services—or...
Hi, what are you looking for?
The website seeks to scale the Defense Department’s bug bounty program by attracting additional white hat hackers. The Defense Department’s Directorate for Digital Services—or...
Enhancing collaboration and information sharing with industry partners can help mitigate threats, but concerns remain about the extent to which foreign-made equipment is embedded...
An audit conducted by the Defense Department’s inspector general found agency components “may be unaware of known vulnerabilities and cybersecurity risks associated with operating...
Defense’s updated plan focuses on role-specific requirements and comes as the agency’s cyber workforce strategy is slated for imminent release. The Defense Department’s Chief...
The Defense Department’s Office of Inspector General points out longstanding unmet requests in a report rounding up recent cybersecurity oversight. The Department of Defense...
The program brings together multiple experts within the Defense Department to develop and implement advanced AI and data analytics in warfighting operations. The data...
The Pentagon has awarded its JEDI cloud contract replacement. The Pentagon on Wednesday announced the awardees of the Joint Warfighting Cloud Capability—or JWCC—contract, with Amazon Web...
“Russian missiles can’t destroy the cloud,” Ukraine’s minister of digital transformation explained. LAS VEGAS—Last February, with Russian military forces bearing down on its nation,...
Defense agencies are to implement zero-trust standards by 2027. Defense agencies have until 2027 to convert their networks to architectures that continually check to...
The departments of Defense and Justice want the agency to take a more comprehensive approach to preventing foreign adversaries from accessing Americans’ communications and...
Recent Comments