The Defense Department’s cyber challenges are enormous. Systems increasingly rely on software code, much of it incorporating open-source components. Growing dependence on cloud-based systems to host databases and computer workloads also expanded the Pentagon’s attack surface. Conventional cyber defenses based on keeping hackers out of ...
SolarWinds
"Foreign adversaries increasingly are incorporating technological superiority into strategic planning to gain advantage over the U.S. While sometimes coming from true scientific advances and genuine research and development, for some adversaries reverse engineering, intellectual property theft, corporate espionage, and cyber intrusions constitute official state policy. ...
Northrop Grumman CEO Kathy Warden sees even more consolidation among top-tier defense contractors in the next 20 years, but the reduction in traditional firms will likely be offset by a surge in new entrants, particularly in the cyber and space domains.
The Air Force's in-house software factories have become hacking targets because they are accelerating the service's fielding of new capabilities, and must be defended as the "crown jewels" they are. The Pentagon needs to apply "Zero-Trust" technology in its data systems, not only keeping hackers ...