DoD issues cloud solicitations to AWS, Google, Microsoft, and Oracle | Breaking Defense


The Defense Department today announced it has issued solicitations to Amazon Web Services, Google, Microsoft, and Oracle for its Joint Warfighting Cloud Capability, or JWCC, an important development in what has been the Pentagon’s longer-than-expected journey to acquire enterprise cloud computing capabilities.

JWCC is envisioned to be the Pentagon’s premier enterprise multi-vendor, multi-cloud computing contract. The program is the follow-up to the Joint Enterprise Defense Infrastructure (JEDI), cancelled by DoD acting chief information officer John Sherman in July after years of delays due to legal battles. JEDI was envisioned as a single-vendor, single-cloud computing contract worth $10 billion dollars over 10 years, which Microsoft won in October 2019. But JEDI faced legal challenges from Oracle before the contract was even awarded. Amazon then challenged the award to Microsoft, and the contract languished in legal limbo for years.

Source: DoD issues cloud solicitations to AWS, Google, Microsoft, and Oracle – Breaking Defense Breaking Defense – Defense industry news, analysis and commentary

Royal Navy to boost electronic warfare (EW), anti-ship missile defense capability on U.K. surface warships | Military Aerospace


Under the Babcock-led partnership with Elbit Systems UK and QinetiQ, the electronic warfare (EW) systems will aim to improve the simultaneous detection and identification of radar signals over a greater frequency range than current capabilities.

The technology is expected to enable faster decision-making, enhanced situational awareness, and anti-ship missile defense capability. The 13-year contract also is expected to drive job creation from software development to manufacturing roles.

Source: Royal Navy to boost electronic warfare (EW), anti-ship missile defense capability on U.K. surface warships | Military Aerospace

CISA Moves to Standardize Federal Cybersecurity Responses With New Playbooks

The Cybersecurity and Infrastructure Security Agency (CISA) has published a document outlining procedures on how civilian agencies should respond to information system incidents and vulnerabilities.

CISA said Tuesday it incorporated the private sector’s best practices into the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks.

Source: CISA Moves to Standardize Federal Cybersecurity Responses With New Playbooks; Matt Hartman Quoted

With Zero Trust, What’s Old Is New—and Critical | SIGNAL Magazine


More than just a technology focus, zero trust (ZT) is an invitation for all of us to think differently about cybersecurity. We are losing on the cybersecurity battlefield, and continued investment in more advanced versions of the same architecture patterns will not change that.

Zero trust is a recurring theme in the Biden administration’s May 2021 cybersecurity executive order, which has generated online discussions, white papers and guidance across public and private sectors, including the critical infrastructure community. More recently, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency and the Office of Management and Budget released a series of key documents for public comment. These documents include the Federal Zero Trust Strategy, the Zero Trust Maturity Model and the Cloud Security Technical Reference Architecture.

Source: With Zero Trust, What’s Old Is New—and Critical | SIGNAL Magazine

Technology at the Heart of Army Defensive Cyber Improvements | SIGNAL Magazine


New technologies are fueling U.S. Army cyber operations as the force girds for more diverse challenges in the operational environment. This thrust entails incorporating innovative capabilities while improving existing systems with new approaches, such as moving to the cloud.

The defensive effort was outlined by a group of experts on the second day of the three-day AFCEA Belvoir Industry Days conference at the Gaylord National Resort & Convention Center, National Harbor, Maryland, November 3-5, 2021. A panel of military and civilian leaders described how these improvements are being incorporated atop existing systems to ensure continued effectiveness in the field.

Source: Technology at the Heart of Army Defensive Cyber Improvements | SIGNAL Magazine

General Atomics is secretly flying a new, heavily armed drone | Breaking Defense


General Atomics has built and flown a prototype of a deadly new drone with significantly more firepower than the US military’s current unmanned aircraft inventory, including the capability to launch a whopping 16 Hellfire missiles.

The unmanned aerial system — whose existence has not been previously been reported — made its first flight this summer at the company’s Desert Horizon test grounds in the Mohave Desert, two sources with knowledge of the program told Breaking Defense.

Source: EXCLUSIVE: General Atomics is secretly flying a new, heavily armed drone – Breaking Defense Breaking Defense – Defense industry news, analysis and commentary

EETimes | 6G: More Hype Than Reality?

The marketing of 6G wireless got a boost this month during the Brooklyn 6G Summit. The event grew out of previous Brooklyn 5G Summits. The 6G jamboree launched the hype cycle for the new technology earlier than ever before, even before underlying 6G infrastructure is in place.

Sixth-generation “research is in full swing, even though 6G commercial deployment is expected [to be] a decade out,” said Peter Vetter, president of Bell Labs Core Research at Nokia, opening the media roundtable that started this year’s Brooklyn 6G Summit. Research is needed to determine the “future technology” that 6G will be based on and what “future applications” it will utilize, Vetter stated.

Source: EETimes – 6G: More Hype Than Reality?

EETimes | Connected, Software-Defined Cars Becoming Inseparable


What follows is an expanded view of the connected car, the precursor to the software-defined car. I’ll argue that connected cars and software-defined cars are becoming inseparable.

Source: EETimes – Connected, Software-Defined Cars Becoming Inseparable

Army considers position, navigation, and timing (PNT) and 3D terrain mapping for GPS-denied environments | Military Aerospace


A special notice posted in October says, “The intent of this special topic is to develop Network Aided devices, including component, sub-component, and associated technologies, to allow dismounted Soldiers to continue to operate without using standard GPS signals.”

The notice is part of a larger push in the Army to develop new tools for position, navigation, and timing (PNT) that enable soldiers to operate in extremely remote environment or in places where adversaries could interfere with GPS.

Source: Army considers position, navigation, and timing (PNT) and 3D terrain mapping for GPS-denied environments | Military Aerospace

Ransomware attacks target German companies at the same time | EURACTIV.com


Medical IT service provider Medatixx announced on Monday (9 November) that it was the target of a cyberattack in the middle of last week and electronics retail companies MediaMarkt and Saturn also fell victim to a nighttime ransomware attack between Sunday and Monday.

Mediatixx reported that the cyberattack encrypted “important parts of our internal IT system”. Meanwhile, a crypto-virus infected several Windows servers at MediaMarkt and Saturn, affecting some 3,100 servers.

Source: Ransomware attacks target German companies at the same time – EURACTIV.com