Cybersecurity

What a big Navy breach taught the Army

The Army had been paying close attention to the Navy's operation to drive Iranian hackers from the unclassified portion of the service's intranet.

Cybersecurity

Army experiments with cyber warfare

The Army continues to experiment with equipping its land forces with cyber capabilities, a recognition that future combat operations could increasingly have a cyber dimension.

Digital Government

Army looks for long-term IT plan

With short- and medium-term plans for IT modernization in place, the Army remains on the hunt for a long-term vision.

Cybersecurity

DISA cyber protection teams deployed

DISA's Lt. Gen. Alan Lynn has moved quickly to defend besieged Defense Department networks.

Modernization

DISA looking for info on cloud-based military email

An RFI outlines the parameters for moving the Pentagon's unclassified email system to the cloud.

Modernization

Four years on, Army common operating environment takes shape

Army IT personnel are using code to integrate C2 nodes into a common architecture that is the backbone of the sensor computing part of the COE.

Cybersecurity

Army tries to speed cyber acquisition process

The Army is using an acquisition template known as the Information Technology Box to help it cope with cyberthreats.

Modernization

Army issues guidance for commercial cloud migration

The guidance stipulates that commands bear ultimate responsibility for ensuring that systems and applications within their portfolios are rationalized.

Cybersecurity

Army looks to beef up Cyber Battle Lab

The cyber lab at Fort Gordon is projected to have "initial operating capability" in October.

Cybersecurity

The quest for command and control in cyberspace

Since the U.S. military declared cyberspace an operational domain in 2011, it has been a question of how and when, not if, the Pentagon will organize its capabilities.

Cybersecurity

Army fights a two-front cyber war

The Army has been testing weapon systems for sophisticated cyber threats, but it was an attack on its public website that underscored the breadth of the challenge facing defense agencies.

Modernization

Knowledge transfer through discovery

Rules and data are relatively easy to share, but capturing an organization's deep, experience-based knowledge requires special effort.