Bringing Speed to DoD Cybersecurity: Applying Best Practices for Agile RDT&E Environments ITEA Journal of Test & EvaluationDeiulio, RobinAlix, Kevin
A new report released today from the Government Accountability Office found the Defense Department faces challenges addressing cybersecurity practices and may be underreporting risks across its major business information technology programs, increasing chances of cost growth and schedule delays. GAO found ...
Embody a more proactive cybersecurity posture:The move from a defensive cyber approach will require some degree of integration with threat intelligence sources for the CDM data set. Agencies should consider participating in CDM’s Host Logging Visibility pilot program, implementing recommendations whi...
The Defense Department will issue a new policy as part of its Adaptive Acquisition Framework focused on cybersecurity to help program managers understand the processes and practices needed throughout the acquisition process, according to senior DOD officials. The framework is designed to allow ac...
DHS’sElectromagnetic Pulse Shielding Mitigationsreport—which includes input from the Federal Emergency Management Agency, the Cybersecurity and Infrastructure Security Agency and feedback from industry and government representatives—builds on the best practices used to protect the...
Pursuing the U.S. DOD's Cybersecurity Maturity Model Certification may impose a regulatory burden, but it is also likely to improve the organization's overall security posture. Learn more about the program's five levels and how to start the compliance pr
9 To date, Flank Speed has onboarded more than 560,000 users and evaluated the effectiveness of its robust cybersecurity tools through Purple Team assessments.10 Another example is Army 365, the United States Army’s Microsoft 365 environment.11 Army 365 has onboarded more than 1.4 ...
An enterprise security strategy requires the ability to lock down a device from a potential cyberattack within seconds. This means devices must have sophisticated cybersecurity mechanisms built into the devices themselves. For example, defense-grade security solutions likeSamsung Knoxcan secure mobile dev...
The DIB-VDP is a collaboration between theDepartment of Defense Cyber Crime Center (DC3), DoD Vulnerability Disclosure Program (DoD VDP), the Defense Counterintelligence and Security Agency (DCSA), and HackerOne. The goal of the DIB-VDP is to promote cybersecurity within DIB vendors...
? Cybersecurity and Zero-Trust The scale, complexity, and decentralized design of 5G architectures make it infeasible to depend upon perimeter security, which assumes that only trusted devices have been allowed inside the network. DoD will instead develop and validate a zero-trust model for 5G. ...