• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • COMTECH banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2024

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

October 9, 2015 by

07 Oct 15. CYBERCOM starts to wield acquisition power. The Pentagon wants to make it easier for U.S. Cyber Command to quickly acquire the tools and services it needs to support cyber operations, according to the Defense Department’s chief weapons buyer. The support reinforces measures in the 2016 National Defense Authorization Act that — if it passes — will give special procurement authorities to drive cyber-focused rapid acquisition.
“I think in the cyber world — first of all, the acquisition, so to speak, in development programs tend to be very small in dollars and short in duration. I don’t have a personal problem…with CYBERCOM having some acquisition authority so that they can do some of the things that they need to do, quickly,” Frank Kendall, under secretary of Defense for acquisition, technology and logistics, on Oct. 6 told reporters at the Defense One State of Defense Acquisition event in Arlington, Virginia.
Kendall said he’s taking steps at the Pentagon to steer cyber acquisition where it needs to go — away from the conventional weapons-buying processes at the DoD.
“I have a group called the Cyber Investment Management Board, which oversees cyber investments, and it was set up partly because of the need to have very rapid and agile investments in cyber in some areas. And, to not use the traditional system,” Kendall said.
In the meantime, though, the command is already exercising buying power with a new $460m contract.
The agreement would cover mission support in cyber operations, including providing “cyber joint munitions effectiveness,” according to the draft documents released Sept. 30.
According to the draft task order, the vendor that wins the contract will be expected to handle key areas that include:
• Provide mission essential coverage to support cyberspace operations.
• Identify requirements and concept of operations that focus on the execution of DoD Information Network (DODIN) operations and Defensive Cyberspace Operations Internal Defensive Measures (DCO-IDM) and assist in the development, synchronization, integration and assessment of operational standards ISO achieving the Joint Information Environment end-state.
• Contribute to efforts to secure, operate, and defend the DODIN and its critical dependencies in order to provide full spectrum cyberspace operations, ensuring freedom of maneuver in that domain and denying our adversaries the same.
• Contribute to CYBERCOM strengthening relationships with key partner nations, coordinating, synchronizing, deconflicting and integrating operational planning efforts for full spectrum cyberspace operations.
• Plan, coordinate, and deconflict offensive cyberspace operations, DCO and DODIN Operations throughout the entire joint operational planning process.
• Identify requirements to fill gaps and identify capabilities in order to achieve an effect in accordance with tactical objectives, operational goals and strategic end-states.
• Prepare courses of action, to include advanced level targeting, capabilities pairing and operational assessments.
(Source: C4ISR & Networks)

07 Oct 15. Network Integrity Systems (NIS), a leader in critical network infrastructure security, and CyberSecure IPS, a leader in centrally managed fiber monitoring software applications, will combine their patented products into an unrivalled cyber security solution to benefit private enterprise and government agencies. The two companies have entered into an exclusive relationship to integrate their best-of-breed technologies into a single solution. The product lines – INTERCEPTOR™ CS for government and VANGUARD™ CS for private enterprise – are a direct countermeasure against growing threats to information security and the increased number of attacks on fiber optic networks. The combined solution provides immediate detection of cyber attacks on the physical layer (cables and interconnection points). These systems can be centrally managed from anywhere in the world and provide firs

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • AtkinsRealis logo
  • IEE
  • EXFOR logo
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
  • GoExporting logo
  • ECHODYNE logo
  • Supercat logo
  • Galvion logo
  • Leonardo DRS logo
  • MTC logo
  • IDC logo
  • IDC logo
  • DVD2024 logo
  • SDSC logo
Hilux Military Raceday Novemeber 2023 Chepstow IAV 2024

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • HENSOLDT acquires ESG Elektroniksystem- und Logistik-GmbH

    December 5, 2023
    Read more
  • NAO Report – MoD Equipment Plan for 2023–2033 Is Unaffordable

    December 4, 2023
    Read more
  • AUKUS Defense Ministers Meeting Joint Statement

    December 2, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT