• About
    • Mission
    • Biographical Information
    • Contact Us
  • Defense
  • Energy
  • Logistics
  • Innovation
  • In the News
  • Follow
  • Like
  • Linkedin
  • Youtube
July 18, 2019July 19, 2019Daniel Gouré, Ph.D.

← Back
← Previous Post
Next Post →

How To Protect The Growing Internet Of Battlefield Things (From Fifth Domain)

July 18, 2019July 19, 2019Daniel Gouré, Ph.D.

Soon, everything and everyone on the battlefield will be connected, often carrying multiple sensors, computers and communications devices. This emerging Internet of Battlefield Things (IoBT) will transform the American way of war. But at the same time, it could create enormous cyber vulnerabilities for DoD as unauthorized and insecure devices are connected to defense networks. It is imperative that the Pentagon implement a security framework that allows only authorized and properly secured devices to access defense networks. Enter Comply-to-Connect (C2C). DoD created C2C as part of its overall strategy for continually monitoring networks even as the number of devices they support grows almost exponentially. Congress directed DoD to implement C2C in 2016. The Pentagon has done pilot studies that prove its effectiveness. Yet, while DoD has made C2C a central element of its network security strategy, it has failed to commit the necessary resources to actually deploy proven solutions. The incoming Secretary of Defense, Mark Esper, needs to make funding a robust C2C deployment one of its first priorities. I have written more on this subject here.

Print | PDF | EMail

Find Archived Articles:

This entry was posted in Defense. Bookmark the permalink.
Sign Up For
LexNext Emails
1600 Wilson Boulevard - Suite 203
Arlington, VA 22209 USA
Phone: 703.522.5828
Fax: 703.522.5837
© 2023 Lexington Institute

Sign Up for LexNext Emails

  • This field is for validation purposes and should be left unchanged.

Sign Up for LexNext Emails

  • This field is for validation purposes and should be left unchanged.