updated Wed. October 2, 2024
-
Nextgov
April 26, 2018
The network upgrade will boost operating speeds for the agency's Enterprise Data Centers, Joint Regional Security Stack sites and Joint Information Environment, the Pentagon's beleaguered effort to consolidate IT infrastructure. It would also bringing new fiber connections to command posts around theÃâà...
DatacenterDynamics
April 24, 2018
At stake is not just money, and prestige for the victorious cloud company, but the future warfighting capabilities of the world's largest military. “The current Department of Defense IT infrastructure is a federated legacy environment based on earlier technology,” White said. “DOD's move to the cloud will rapidlyÃâà...
Department of Defense
April 18, 2018
He said he saw units upgrading to long-outdated computer programs, computer systems that didn't work with each other and a product development process in which systems are outdated by the time they are delivered. “My summary conclusion is that we have fantastic people who are trapped in a very badÃâà...
CyberScoop
April 17, 2018
A government-backed hacking group tried to breach the Department of Defense via the exact same software vulnerability that was used to breach Equifax, an official with the National Security Agency said Tuesday during a speech at the 2018 RSA conference. “The vulnerability that took down Equifax lastÃâà...
CyberScoop
April 17, 2018
Automation tools can help DOD cut through the “noise” of unneeded data, she said at a panel discussion of continuous monitoring for cyberthreats. The department's thousands of computer systems make automation imperative to keep those systems patched and identify insider threats, Janssen added.
Government Accountability Office
April 16, 2018
For example, the National Defense Authorization Act (NDAA) for Fiscal Year 2016 required DOD and the military departments to issue guidance to address five ... As a result, DOD lacks assurance that its IT infrastructure will support the department's business priorities and related business strategies.
Nextgov
April 12, 2018
An updated national strategy that will guide how the Trump administration handles cyber defense and threats is being debated at the White House and “should be forthcoming in the near future,” a Pentagon official told lawmakers Wednesday. That strategy, in turn, will inform a Defense Department cyberÃâà...
Washington Technology (blog)
April 11, 2018
Other health IT priorities at DOD include building and upgrading its IT infrastructure and cybersecurity. VA also is in the midst of its own EHR implementation and is expected to sign a sole source contract with Cerner. No word yet on what role Leidos may play. Other priorities include cyber, cloud and digitalÃâà...
Business Insider
April 4, 2018
The Pentagon is close to awarding a cloud-services contract worth as much as $10 billion to Amazon, even as President Donald Trump attacks the ... and says "your Defense Department is set to award a no-bid, ten-year contract for all its IT infrastructure to Administration-enemy Jeff Bezos' Amazon.".
Markets Insider
April 4, 2018
Trump quietly met with a major tech CEO whose company is locked in competition with Amazon for a Pentagon contract worth billions ... Addressed directly to Trump, the ad warns: "Your Defense Department is set to award a no-bid, ten-year contract for all its IT infrastructure to Administration-enemy JeffÃâà...
Defense Systems
April 4, 2018
The founding director of the Pentagon's digital service team and a key leader of the Cloud Executive Steering Group is sticking around for a third year. ... called "Hack the Pentagon," which offered security experts rewards for identifying weaknesses in public-facing Department of Defense computer systems.
FCW.com
April 3, 2018
Lynch made waves in the starched, orderly world of the Pentagon by wearing a hoodie to work and launching a bug bounty program called "Hack the Pentagon," which offered security experts rewards for identifying weaknesses in public-facing Department of Defense computer systems. A new round ofÃâà...
Nextgov
April 2, 2018
The contest, hosted by the cybersecurity platform HackerOne, marks the Pentagon's fifth bug bounty program. Bug bounty programs recruit ethical or white-hat hackers to find security holes within an organization's computer networks. Vulnerabilities can range from low-risk flaws to major problems capableÃâà...
FCW.com
March 28, 2018
Addressed directly to the president, it warns, "Your Defense Department is set to award a no-bid, ten-year contract for all its IT infrastructure to Administration-enemy Jeff Bezos' Amazon." DOD released a draft solicitation for its Joint Enterprise Defense Infrastructure (JEDI) cloud acquisition in early March,Ãâà...
CNBC
March 15, 2018
The bank told the Defense Department that the attack came from a computer system that was randomly guessing cardholder account usernames and passwords. The program hit Citigroup's Pentagon online account application more than 1.3 million times. The hackers did successfully guess 318 PentagonÃâà...
Department of Defense
December 31, 1999
White said the existing DoD IT infrastructure is a federated legacy environment based on earlier technology. ... With JEDI Cloud, DoD is pursuing infrastructure and platform as a service, which is the foundational layer necessary to enable advanced capabilities such as machine learning and artificialÃâà...
Business Insider
December 31, 1999
Amazon Web Services filed a protest this week that indicates it would contest any meddling by President Donald Trump into a coming Pentagon contract. Amazon Web Services filed a protest with the Government Accountability Office on Tuesday to contest the awarding of a military contract to Google.