DoD

Amelia Brust/Federal News NetworkCMMC, CMMC Accreditation Body, Cybersecurity Maturity Model Certification,

The original CMMC program was missing one key component — Here’s how the newly proposed rule should fix that

The proposed CMMC changes show the industry that the DoD is taking security, and this shared burden, seriously.

Read more
Getty Images/iStockphoto/NicoElNinoweapon systems, zero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

Zero trust for weapons systems will be a ‘heavy lift’ for DoD

Read more
cybersecurity concept with biometric technology element

DoD to automate assessment of zero trust implementation plans

Read more
(Getty Images/iStockphoto/metamorworks)Medical technology concept.

Pentagon’s reproductive healthcare policy used 12 times from June to December

Read more
Amelia Brust/Federal News NetworkFAR, Federal Acquisition Regulation,Contracting

DoD award lead times increased for higher value contracts

Read more
cybersecurity

Contractors make the case for flexibility in a forthcoming Defense Department cybersecurity program

Read more
(Photo courtesy of the Government Accountability Office)GAO, intelligence oversight

Report card shows shortcomings in how DoD oversees intelligence

Read more
(AP Photo/J. Scott Applewhite)Congress

DoD calls for more contracting flexibilities in 2025 NDAA

Read more
United States Syria Islamic State

Central Command to release new data strategy

CENTCOM is paving its own data narrative with a new strategy while moving closer to Combined Joint All-Domain Command and Control.

Read more
Amelia Brust/Federal News NetworkFAR, Federal Acquisition Regulation,Contracting

Pentagon wants to be ‘approachable’ for small businesses

Small businesses are entering the defense industrial base at a historically low rate, but the Pentagon wants to turn things around.

Read more
U.S. Navy/MC1 Byron C. LinderSOUTH PACIFIC (July 9, 2017) Operations Specialist 1st Class Charles Hammond, from Kansas City, Missouri, monitors tracks aboard Arleigh Burke-class guided-missile destroyer USS Sterett (DDG 104) during an air defense exercise comprised of Sterett, amphibious assault ship USS Bonhomme Richard (LHD 6), amphibious transport dock USS Green Bay (LPD 20), amphibious dock landing ship USS Ashland (LSD 48), Royal Australian Navy frigate helicopter HMAS Ballarat (FFH 155), Royal Australian Navy guided missile frigate HMAS Darwin (FFG 04), and Royal Australian Navy frigate helicopter HMAS Toowoomba (FFH 156) as part of Talisman Saber 17. Sterett, part of a combined U.S.-Australia-New Zealand expeditionary strike group (ESG), is undergoing a series of scenarios that will increase proficiencies defending the ESG against blue-water threats so amphibious forces can launch Marine forces ashore in the littorals. Talisman Saber is a biennial U.S.-Australia bilateral exercise held off the coast of Australia meant to achieve interoperability and strengthen the U.S.-Australia alliance. (U.S. Navy photo by Mass Communication Specialist 1st Class Byron C. Linder/Released)170709-N-ZW825-895

Navy explores generative AI to automate security classification

The Navy wants to explore the idea of incorporating natural language capabilities into classification guides to be able to probe datasets.

Read more