Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Upcoming study outlines broad strategy for securing future DoD computer networks

28/08/2015 by Sharon Shahzad

W1siziisijiwmtuvmdgvmjgvmtuvmjavmjcvotyxl1blbnrhz29ulkpqryjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

As the Defense Department contends with greater and more sophisticated cyber attacks, it needs to enhance security from "chip to the cloud" and boost the speed and performance of system defenses, while remaining cost-effective, according to a recent Lexington Institute blog post.

The post, written by Daniel Gouré, who is the think tank's vice president, provided a broad six-step strategy that DoD should follow to secure networks in this emerging environment. He added the strategy is part of a forthcoming study from the institute.

Gouré wrote that the Defense Information Systems Agency, which is the Pentagon's information technology arm, developed the "first coordinated, department-wide security system," with the Host-Based Security System, or HBSS, at its core.

"HBSS is a commercial off-the-shelf (COTS) based application that has undergone rigorous security, functionality and compatibility testing that proved its effectiveness on more than 7 million endpoints," he wrote. "When properly managed, with trained operators, kept up to date and fully implemented, HBSS is reported to be extremely effective against today's spectrum of threat."

Still, Gouré, who has held senior positions in the federal government, added the six-step strategy can further enhance security. It includes:

  • Building on DISA's investments and experience with HBSS rather than starting from scratch. DoD's current capabilities are still relevant and, if maintained, can allow new investments to focus on more challenging matters such as dealing with advanced persistent threats.
  • Creating one security architecture that eliminates stovepipes, shrinks the attack surface, consolidates network administration, and provides end-to-end situational awareness, among other advantages. "In particular, looking ahead, the single manager would support the efficient allocation of resources while avoiding redundancies."
  • Establishing an overall system manager who can maintain configuration control and increase overall enterprise effectiveness and efficiency in provisioning services

This article has been extracted from http://www.fiercegovernmentit.com, please click on this link to read the article in full http://www.fiercegovernmentit.com/story/upcoming-study-outlines-broad-strategy-securing-future-dod-computer-network/2015-08-27

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...