Federal information technology (IT) networks must be treated as secure architecture and all departments and agencies need to identify and accept cyber risks in order to best move forward with new security protocol, according to White House Cyber Security Coordinator Rob Joyce.Joyce, speaking at MeriTalk’s Gov Protect event on June 21, discussed White House’s role in pursuing cyber security measures and expounded on the four major themes included in the recent cyber executive order signed in May, such as risk…
Recommended
Swarmer Leads Ukrainian Team Developing Counter-Unmanned Systems Platform
Trending
Congress Updates
Senate Appropriators Concerned With DoD’s Reconciliation Plan For Top FY ‘27 Priorities, Aide Says
Senate defense appropriators have concerns with the Pentagon’s decision to include key fiscal year 2027 funding priorities, such as critical munitions and drones production, among its request for $350 billion […]
With $1.5 Trillion Request, Army, Air Force, Navy’s Unfunded Lists Focus Solely On MILCON Projects
With the Trump administration’s push to massively increase defense spending to $1.5 trillion in fiscal year 2027, the Army, Air Force and Navy have eschewed submitting large unfunded priorities lists […]
Bipartisan House Bill Would Give National Guard To Counter-Drone Authorities
Seeking to close gaps that may arise between state and local law enforcers in different jurisdictions, a bipartisan contingent of House members this week introduced a bill that would allow […]
Munitions Fired Represent Most of $25 Billion Spent By Pentagon on Iran War So Far
Munitions fired in the two-month old “Operation Epic Fury” against Iran represent most of the $25 billion cost the Pentagon has incurred thus far in the conflict, the acting Defense […]
By