Marine Fighter Attack Squadron 115 aviation ordnance technicians load compatible software for a U. S. Air Force Guided Bomb Unit 38 to be employed on a U.S. Marine Corps F/A-18 Hornet proof of concept mission at an undisclosed location in Southwest Asia, March 14, 2022. (U.S. Air Force Photo by Master Sgt. Christopher Parr)
Chris Lynch, founding director at Defense Digital Service, shares why it's important for the Department of Defense to invest in the infrastructure to power its software needs.
Capt. Seth Hayden of the Army Cyber Protection Brigade monitors exercise progress in the white team operations area for exercise Operation Tiger Stance, at the Indiana National Guard’s Muscatatuck Urban Training Center in Butlerville, Ind., Aug. 23, 2018. (Photo by Bill Roche)
Dubbed Tatooine, the new workspace located at the state-owned Georgia Cyber Center is the expansion of a pilot project launched last year to join DDS staff and…
DOD tapped cybersecurity firms Synack, HackerOne and Bugcrowd to provide vetted hackers for continual assessments of defense websites, hardware and physical systems.
Defense Digital Service Director Chris Lynch speak during the JEDI Cloud Industry Day in Arlington, Va. March 7, 2018. The unclassified event outlined the Defense Dept.’s acquisition plans for the Joint Enterprise Defense Infrastructure (JEDI) Cloud. (DoD photo by EJ Hersom)
LAS VEGAS, NEVADA – NOVEMBER 29: Attendees walk through an expo hall during AWS re:Invent 2022, a conference hosted by Amazon Web Services, at The Venetian Las Vegas on November 29, 2022 in Las Vegas, Nevada. (Photo by Noah Berger/Getty Images for Amazon Web Services)
The Pentagon's swat team has hosted highly-publicized challenges to find flaws in department and military branch websites, but they also recently orchestrated a more secret, complex project.