The defense digital terrain is changing rapidly. The growth in defense networks and the systems on them is already explosive. This will increase exponentially with the introduction of the Joint All Domain Command and Control (JADC2) system. If successful, it will enable the creation and maintenance of a continually changing, even kaleidoscopic, constellation of endpoints involving the military Services, other government agencies, and coalition partners. Supported by sophisticated cloud environments and employing artificial intelligence (AI) and machine learning tools, information will flow rapidly and seamlessly across the JADC2 network. To meet the required decision speeds many routines will have to be automated. So too will the cybersecurity systems that will protect the JADC2 networks and the information that flows across them. As part of its zero trust strategy, DoD needs to implement Comply-to-Connect across its networks and work to introduce automated cybersecurity solutions. I have written more on this subject here.
Find Archived Articles: