News

The Department of Defense published its first data strategy Thursday, calling for a broad cultural shift across the military to use data at every echelon in support of warfighting.. Developed under ...
Deputy Secretary of Defense Kathleen Hicks issued a new memo introducing “Data Decrees” that give instructions to the Department of Defense on how to better use the military’s data for everything from ...
The CMMC program is the DoD's answer to years of security gaps, cyber breaches and noncompliance with cyber requirements.
Eileen Vidrine, the Air Force's chief data officer, talks about department's priorities are, how they've changed this year and how the Defense Department's data strategy ties it all together.
Attacking DoD's Data Problem. Story by Elaine McCusker • 3mo. T he Department of Defense (DOD) needs a single source of truth at the enterprise level to pass a full financial statement audit.
The Marine Corps want to reorganize its repository of 3D printing designs and technical information into a data vault that makes it easier for the 300+ users to find the designs they need.
Deputy Defense Secretary Kathleen Hicks issued a memo detailing DOD's five "data decrees," establishing rules for creating and managing data as an enterprise resource and strategic asset.
The Defense Department unveiled a new data strategy Thursday aimed at transforming the Pentagon into a data-centric organization. The 11-page document is DOD’s first enterprisewide data strategy.
To stay ahead of adversaries, the DoD and IC must continue to mature cyber capabilities, implementing zero trust models for their own organizations and encouraging deployment in the broader contractor ...
David Spirk, the Defense Department’s chief data officer, touted the need for data commandments and continuous education to make JADC2 a reality.
The DOD is developing a “single ingest point” at which “all of that data is normalized so it can be read by all of our applications" to prep for CJADC2, according to officials.
The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero ...