As the federal government continues to ride the waves of digital transformation and network modernization, one decision that many agencies have decided to make has been to migrate their applications, workloads, and services – which have been traditionally managed on-prem…
Compliance – is it becoming too big of a thing?
You have heard it enough to make you aim a fire extinguisher at your firewall: “compliance does not mean security.” Compliance work can consume up to 70 percent of security budgets in federal government agencies, and it is common to…
Can Analytics Help the Military Better Plan for Cyberattacks?
According to a recent report by Booz Allen Hamilton, The sheer complexity of military systems, the numerous interconnections between systems and missions, and the siloed nature of military organizations makes it difficult for the senior military leaders to quickly and…
Military Struggles to Identify Full Impact of Potential Cyber Attacks
Today’s weapon systems used by our warfighters against our largest adversaries are increasingly network-enabled. Unfortunately, the network-centric nature of these systems opens them up for cyberattack – making it possible for our adversaries to deny our military’s weapon systems when…
What Steps Can the Military Take to Secure Weapon Systems?
Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…
Could Adversaries Hack Weapon Systems? It’s Certainly Possible…
Much of the same evolution that we’re seeing in our own vehicles – including the emergence of autonomous vehicles and smarter, more connected vehicles – is occurring, in parallel, in military vehicles and weapons platforms. There is barely a single…