• About
    • Mission
    • Biographical Information
    • Contact Us
  • Defense
  • Energy
  • Logistics
  • Innovation
  • In the News
  • Follow
  • Like
  • Linkedin
  • Youtube
August 27, 2021Daniel Gouré, Ph.D.

← Back
← Previous Post
Next Post →

The U.S. Military Must Move Fast To Achieve Enterprise Network Endpoint Security (From 1945)

August 27, 2021Daniel Gouré, Ph.D.

In response to the danger posed by COVID-19, remote working has become the norm for the Department of Defense (DoD). As a result, there has been an explosion of endpoints (laptops, desktops, tablets, mobile phones, and servers) on Pentagon networks. Congress is pressing DoD to improve its abilities to monitor endpoints and assure that only legitimate ones are permitted on the networks. The bigger challenge is how to protect not just networks and their endpoints but everything that is an Information Technology asset. These are computer-controlled systems called Operational Technology. DoD needs to address a growing vulnerability, starting with the creation of a standard monitoring methodology and set of definitions with which to guide its introduction of cybersecurity tools and applications. I have written more on this here.

Print | PDF | EMail

Find Archived Articles:

This entry was posted in Defense. Bookmark the permalink.
Sign Up For
LexNext Emails
1600 Wilson Boulevard - Suite 203
Arlington, VA 22209 USA
Phone: 703.522.5828
Fax: 703.522.5837
© 2023 Lexington Institute

Sign Up for LexNext Emails

  • This field is for validation purposes and should be left unchanged.

Sign Up for LexNext Emails

  • This field is for validation purposes and should be left unchanged.