Navy
-
What is ICAM's Role in Federal Zero Trust?
Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
5m read -
Zero Trust 'Essential' and 'Integral' to JADC2
DOD leaders say you can't have JADC2 without zero trust and a "data-centric" approach to cyber.
7m read -
Navy IDs Security Risks Ahead of 5G Implementation
The Navy is using ICAM and other tools to prepare its IT landscape for the new technology standard.
19m listen -
Navy's Zero Trust Strategy Targets ID Solutions First
Organizations should treat zero trust like a mindset rather than as a set of rules or tools.7m read -
Navy Tackling ID Solutions Toward Zero Trust Goal
Navy Principal Cyber Advisor Chris Cleary and DLT Chief Cyber Security Technologist Don Maclean discuss the White House Executive Order on Improving the Nation's Cybersecurity.
44m watch -
Baked-In Security Key to Safely Modernizing 'Flying IT Systems'
DOD acquisition officials highlight the value of MTA pathways for acquiring weapons systems.
7m read -
DevSecOps is Essential For Good Cybersecurity
Defense leaders say nothing is more important to a sound cyber strategy than culture change.
7m read -
Remember These Key Steps For Federal AI Adoption
Federal AI leaders share examples of groundwork around data management, training and culture.
7m read -
Defense Leads Tackle Joint Operations Challenges
The military branches are coming together to make artificial intelligence capacities to support decision-making a reality.
7m read -
Military Services Are Transforming Cloud Operations
The Army and Navy are integrating new cloud strategies to drive technology adoption and utility.
7m read -
JADC2 Necessary for Further Modernization Across DOD
The new strategy aims for operational decision-making and smoother integration of new capacities across the U.S. Armed Forces.
7m read -
DevSecOps Essential for Defense Preparedness
Military services are using automated development practices in the adoption of new technologies and to safeguard IT security.
7m read