{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Grasping the federal software landscpe

Since the federal government learned it was a victim of the massive SolarWinds hacking campaign, the Cybersecurity and Infrastructure Security Agency has been working to gain an understanding of critical software across government. Now, CISA believes it has a better grasp of the risks such software poses to national critical functions and developing tools to mitigate the threats, said Bob Kolasky, assistant director of CISA’s National Risk Management Center. Dave Nyczepir has more.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

A model for future Army acquisitions

Gen. James McConville wants the Army's recent $21 billion purchase of Hololens 2 headsets to be a model for the way it acquires other transformative technologies in the future. The program shattered the usual multi-year — even multi-decade — timeline for fielding major Army acquisition programs, taking just 28 months to go from prototype to purchase, largely thanks to a novel structure of embedding soldiers in the design process, McConville said. “IVAS is a good example of where we are trying to go with acquisition as a whole.” Jackson Barnett has this one.

Pentagon chiefs tout emerging tech

The Pentagon's two topmost leaders have made it a point in recent speeches to emphasize the importance of emerging technologies to military operations. Secretary of Defense Lloyd Austin called for the need to depart from previous ways of waging war and focus on new, technology-driven tools and strategies during his first major speech, given in Honolulu at the change of command ceremony for Indo-Pacific Command last Friday. The same message was echoed later that same day by Deputy Secretary Kathleen Hicks, who said that the department must “aggressively take steps to be a data-centric organization” and create new ways to use data in the field and in command centers. Jackson has more on why this is important.

DOD expands vulnerability disclosure program

The Pentagon also announced this week it is expanding the number of its own targets that ethical hackers can go after to try to ferret out vulnerabilities through the Hack the Pentagon program. Previously, the program allowed cybersecurity professionals to test department systems when it involved public-facing websites and applications. Now interested hackers may go after all publicly accessible DOD information systems, including publicly accessible networks, Internet of Things devices and industrial control systems. Read more on CyberScoop.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}