Tuesday, 3 August 2021

Weekly Briefing: Defense Networks & Cyber

The latest defense networks & cyber news and analysis from Breaking Defense.

Protect Data Integrity With Military-Grade Cryptographic Key Management

Presented by Ultra Intelligence & Communications

Key Management_Breaking Defense 0821 v2-1
The Navy Wants Industry To Manage Its Autonomy Integration Efforts

The Navy wants to hire an industry partner for its Rapid Autonomy Integration Lab, or RAIL, office.

 

Raytheon, Navy Finish SPY-6 Testing At Wallops

The company is anticipating a contract later this year for work associated with backfitting Flight IIA destroyers.

 

Northrop Exploring How SEWIP Can Feed Into Project Overmatch

"We were able to … create new software and put new communication waveforms through the system and demonstrate a class a wave forms it could be critical to the Navy as they look at Project Overmatch," said Mike Meaney, a Northrop Grumman official.

 

Exposing The Data Makes JADC2 Possible

[Sponsored] Aligning current and emerging technologies for Joint All-Domain Command and Control is the enabler that will let warfighters acquire data and quickly act on it by applying effects where they need them, when they need to, and on the timeline they need them.

 

NSA Releases Security Guidance For DoD, Contractors On Public Networks

"The risk is not merely theoretical; these malicious techniques are publicly known and in use," NSA notes.

 

What Are The Best Ways To Shield Taiwan From A Hungry China?

The trick will be to avoid "a situation in which China believes that it has no alternative but to act," says RAND's Michael Mazzar.

 

Beyond ABMS: Air Force Pushes Experimental Tech For AI, IT, Data

The expanded experimentation campaign is also building new "business approaches" — some of which will require Pentagon-level blessing — to speed software-based capabilities to the field, DAF Chief Architect Preston Dunlap said.

 

Biden Issues National Security Memorandum On Critical Infrastructure

"I think it's more than likely we're going to end up, if we end up in a war – a real shooting war with a major power – it's going to be as a consequence of a cyber breach of great consequence, and it's increasing exponentially," President Biden said.

 

Tech Innovation, Spectrum Strategy Among House Markup Priorities

The markup comes at a pivotal moment for the US as it intensifies competition — while seeking to avoid conflict — with China, in particular, which senior department officials refer to as the US's "pacing threat."

 

Allies, No-Strings Vaccines, Human Rights, Open Seas: SecDef In Singapore

"Unfortunately, Beijing's unwillingness to resolve disputes peacefully and respect the rule of law isn't just occurring on the water. We have also seen aggression against India… destabilizing military activity and other forms of coercion against the people of Taiwan… and genocide and crimes against humanity against Uyghur Muslims in Xinjiang," Secretary Austin said.

 

No Cloud Is An Island

[Sponsored] For DoD multi- and hybrid-cloud environments, the ability to execute continuous Authority to Operate control is important in order to ensure that both cloud infrastructure and cloud-native applications are secure.

Breaking Defense
611 Broadway • New York, New York • 10012
unsubscribe

No comments:

Post a Comment