Category Archives: Cybersecurity

Webinar Update

Jim and I have now completed six thirty minute webinars that are posted on this site, YouTube, and Linkedin. Here is a short introduction to these webinars. We find these discussions to be very informative and relevant to the challenges … Continue reading

Posted in Cybersecurity, DoD Acquisition, DoD IT Acquisition, Global Perspectives, Leadership, National Security, Technology Evolution, The China Challenge, U.S. Navy Capability | Leave a comment

How Did We Get Into This Cybersecurity Mess?

We all know that information about our adversaries and partner countries is and always has been critical to National Security. Before our interconnected world of the internet, information operations were more about human spying, one person to another. As technology … Continue reading

Posted in Cybersecurity, Technology Evolution | 15 Comments

Can DevSecOps Undo DoD’s Broken Software Failures?

The Department of Defense (DoD) has been developing software intensive systems for the last thirty years. Only in the past decade has the Department openly recognized that these software intensive systems are critical to the future of U.S. National Security. … Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Technology Evolution | 22 Comments

Blockchain – The Coming Global Paradigm Shift!

Blockchain my become the basis of a new economy, but it can start transforming DoD Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Leadership, Technology Evolution | 11 Comments

Navy Acquisition Can Easily Be Fixed

Driven by peer naval competition from Russia and China, the U.S. Navy has embarked on a transformational Fleet Design vision to enhance U.S. naval warfare. Along with new weapon and sensor technologies, this vision is critically dependent upon out-pacing peer … Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Leadership, Technology Evolution | 19 Comments

Time for Transformational Cybersecurity Part II

The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void.  It … Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Technology Evolution | 2 Comments

Time for Transformational Cybersecurity! Part I

One of the hardest things to change in human society is a long-standing myth. The current well accepted myth about information technology (IT) systems is that they cannot be defended against well-funded, determined hackers.  Because such myths are rarely questioned, … Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Technology Evolution | Tagged , , , | 4 Comments

Time to Fix DoD Acquisition and Ensure Cybersecurity!

Now that we have a new administration readying to transform the Executive Branch, it is the right time to reverse decades of inefficient DoD acquisition! Because cyber vulnerabilities are pervasive, today’s acquisition challenges are even more complex than the challenges of twenty years ago.  If … Continue reading

Posted in Cybersecurity, DoD IT Acquisition | Tagged , , | 35 Comments

DoD’s Fatal Cybersecurity Flaw

“In today’s globalized world… …this approach couldn’t be more ill conceived!” The DoD currently attempts to mitigate cyber threats through onerous certification processes and drawn-out acquisition decision and implementation timelines. In today’s world plagued with cyber criminals and dedicated state sponsored cyber … Continue reading

Posted in Cybersecurity, DoD IT Acquisition | 10 Comments

Can DoD Get Out of It’s Cyber-IT Rut?

Pacing modern IT services is critical to the DoD in the face of peer cyber competitors. The future of U.S. military deterrence will depend up our ability to provide effective IT services while preventing cyber attacks. Continue reading

Posted in Cybersecurity, DoD IT Acquisition | 14 Comments