DISA
-
Pentagon Zero Trust Challenges Include Scalability, Interoperability
Testing, scaling and interoperability are the remaining impediments as DISA moves closer to completing its Thunderdome zero trust prototype.
5m read -
Data Mapping, Operational Understanding Are Next Steps For Zero Trust
Agencies are aligning security and performance needs.
7m read -
CISA, DISA are Focusing on Transparency to Secure Supply Chain
SBOMs and transparency are key to resilient cybersecurity models.
5m read -
Addressing Challenges in DOD's Edge Computing, Multi-Cloud Environments
DISA’s Hosting and Compute Center is working through technical and programmatic challenges created by hybrid and multi-cloud environments.
5m read -
DISA Extends Thunderdome Zero Trust Prototype for Classified Network
The six-month extension will allow DISA to develop a SIPRNet-specific zero trust solution for JADC2.
5m read -
Cyber Training a Key Priority for CENTCOM's Contributions to JADC2
The department is putting cybersecurity first in strategic next steps.
35m listen -
DOD, OMB Agree Identity Management Is Key To Implementing Zero Trust
Identity management, level of assurance and single source of truth are pillars of the zero trust approach to cybersecurity.
5m read -
DISA Delivers Dynamic User Experience Through Warfighter-Centric Portfolio
DISA’s HaCC empowers the warfighter by delivering problem-solving capabilities via user-centered design.
5m read -
Successful Cybersecurity Integrates Agile and Well-Trained Users
Training a cyber-aware workforce can transform end users from potential vulnerabilities into security enablers.
5m read -
Flywheel Fridays - Cloud Modernization Event Recap
Join us for a recap of GovCIO Media & Research's first in-person event in over two years.
14m listen -
DISA's C2 Modernization Plan for JADC2 Includes AI, Automation
Data and cyber leaders detailed challenges with C2 modernization and how it will be the foundation for JADC2 implementation.
5m read -
DISA Working Toward New Data Management With New CDO
The agency follows a collection of guiding principles that include secure and modernized systems to accomplish an extensive data architecture across the agency.
5m read