

“We’ve heard you loud and clear on this within the DoD. I’m not going to say this is going to solve every bit of it, but it’s going to help us a bit,” Pentagon CIO John Sherman said.
By Carley Welch
“It’s great to have internet day to day in peacetime,” said Lt. Gen. Robert Skinner, director of the Defense Information Systems Agency, “but it’s more imperative to have it when bullets are flying.”
By Sydney J. Freedberg Jr.
The civilian internet firm will build prototype software for Tactical Identity Credential & Access Management, a critical step in bringing “zero trust” cybersecurity to battlefield networks.
By Sydney J. Freedberg Jr.
“We were very disjointed” in efforts to support contractors, admitted Pentagon CISO Dave McKeown. “We want to make that more streamlined.”
By Sydney J. Freedberg Jr.
‘Store Now, Decrypt Later’ attacks must be thwarted now with Zero Trust cybersecurity.
By Breaking Defense
“I love AI. I want lots of AI,” Dave McKeown told Breaking Defense. But, so far, neither government nor industry has developed artificial intelligence that can really help with cybersecurity.
By Sydney J. Freedberg Jr.
A Breaking Defense webinar with experts from CDAO, APL, and CNAS gets into the question of defining artificial intelligence vs machine learning.
By Barry Rosenberg
In our latest eBook we’re bringing you the collection of stories covering Navy’s expansion of unmanned capabilities, call for a culture of shared cyber responsibility, reflecting on shipbuilding priorities and much more.
By Breaking Defense
With official outlets like RT and Sputnik kicked out of many Western countries, Moscow now emphasizes social media — exploiting TikTok, X, and the explosion in generative AI, according to a new report.
By Sydney J. Freedberg Jr.
“Mission engineering” can integrate space and ground assets to push data to the edge.
By Breaking Defense
“Those are the next steps that are going to be most challenging because … people are messy, right?” Navy cyber advisor Scott St. Pierre said. “Everybody’s like, ‘No, that’s mine. I don’t want to touch it.’ … What we really need to do is help everybody understand that we’re all in this together.”
By Jaspreet Gill
The US and China are racing to develop quantum technologies. But each superpower is emphasizing different applications of the same fundamental science, and some American experts think a couple of Beijing’s top priorities may be dead ends.
By Sydney J. Freedberg Jr.
Digital engineering and modern tools and processes offer near-term opportunities to improve satellite mission planning, data processing, command and control, and cybersecurity.
By Breaking Defense
At its most basic level, under CMMC 2.0, defense contractors and subcontractors that have access to controlled unclassified information (CUI) will be required to demonstrate the “maturity” of their cybersecurity programs against a set of increasingly advanced capabilities.
By Jaspreet Gill