As the Defense Department contends with greater and more sophisticated cyber attacks, it needs to enhance security from "chip to the cloud" and boost the speed and performance of system defenses, while remaining cost-effective, according to a recent Lexington Institute blog post.
The agency said the guide isn't official DoD or DISA policy, a security requirement or technical implementation guidance, but "a collection of best practices discovered during the DoD [Chief Information Officer] Cloud Pilots effort."
The Defense Mobile Classified Capability–Secret has moved out of the pilot phase with the latest release that provides improved call interoperability, failover or redundancy, and a new mobile device management system.
The Defense Department's chief information officer signed new guidance for the management of information technology services.
The Defense Department's inability to properly move to Internet protocol version 6, or IPv6, could mean cost increases and vulnerability to cyber threats, a new report found.
The Defense Department is running a small-scale mobile device security pilot that could enable the department to move away from common access card readers for mobile devices by July.
The new tool provides secure voice and video exchange as well as the ability to share documents, PowerPoint slides, photos and spreadsheets in various formats. It also offers instant text messaging and chat functionality for multiple users.
The Defense Department plans to take the unclassified side of the its enterprise email to a commercial cloud solution, said Acting DoD Chief Information Officer Terry Halvorsen.
The Defense Information Systems Agency Jan. 13 publicly released guidance that updates and codifies enhanced cybersecurity requirements for implementing and hosting cloud computing systems for certain types of sensitive Defense Department data.
The Defense Department's information technology agency is seeking information about next-generation security capabilities that would protect complex systems against advanced persistent threats.