In response to the danger posed by COVID-19, remote working has become the norm for the Department of Defense (DoD). As a result, there has been an explosion of endpoints (laptops, desktops, tablets, mobile phones, and servers) on Pentagon networks. Congress is pressing DoD to improve its abilities to monitor endpoints and assure that only legitimate ones are permitted on the networks. The bigger challenge is how to protect not just networks and their endpoints but everything that is an Information Technology asset. These are computer-controlled systems called Operational Technology. DoD needs to address a growing vulnerability, starting with the creation of a standard monitoring methodology and set of definitions with which to guide its introduction of cybersecurity tools and applications. I have written more on this here.
Find Archived Articles: