Information Assurance

DISA releases new security guide for cloud computing

The document sets out the requirements for commercial and non-DOD providers, with a goal of streamlining the acquisition process for DOD agencies.

2 keys to enhancing DOD’s new risk framework

There are a couple of things agencies should require from vendors to better address the DIARMF process, Dan Fallon of Nutanix says.

Army awards $125 million contract for cyber operations

NCI, which has handled cyber network operations and security support since 2007, gets a new deal.

Pentagon launches Insider Threat Program

Several years in the making, the program looks to create an integrated process for keeping classified information under wraps.

DARPA moves ahead on protecting military wireless networks

The Wireless Network Defense program looks to lay the foundation for the next generation of wireless systems.

Base-by-base, Army modernizes its crypto

A CERDEC team of engineers is touring bases in the United States and abroad, replacing antiquated devices with standardized, 21st-century units.

Air Force wants new tech for cross-domain, mobile info sharing

The service’s research lab is soliciting ideas through 2018 on multi-level security information sharing, both within the enterprise and out to mobile and tactical environments.

DOD issues new rules on unclassified net security

Pentagon wants contractors to implement information security standards on their networks and report cyberintrusions.

Cloud security specialists merge

HyTrust acquires HighCloud Security and its encryption software.

DOD seeks agility after spectrum shift

The Pentagon’s deputy CIO expects “orderly change” to new spectrum bands over the next several years.

Cybersecurity in the era of controls

A new movement in security is taking hold based on continuous monitoring of critical security controls.

Air Force factoring spectrum reallocation into integration plans

The service’s integration chief says he is working to ensure uninterrupted joint operations.

Shelton: Greater operational capacity needed in space, cyber

Space Command chief warns that internal challenges weaken Air Force defense capabilities.

Army looks to integrate micro drones

Barclay stresses combined operations as a way to stretch procurement dollars.

Addressing security challenges of a common operating environment

Jim Quinn, vice president of C4ISR Systems for Lockheed Martin Information Systems & Global Solutions, on sharing and security challenges of a common operating environment.

How to properly assess cyber security

While a perfect cyber security assessment does not exist, using the internationally recognized ISO set of standards provides a solid foundation upon which organization’s can build.

Apple garners DISA approval for its mobile operating system

None