US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department (DoD) missions. Now, the CIA's Chief Technology Officer Nand Mulchandanand the former head of the Air Force's Project Maven want to take the Pentagon out of the industrial age and into the digital age.

The offices of the chief information officer, the under-secretaries of defense for acquisition and sustainment and research and engineering, as well as the software modernisation senior steering group are involved in efforts to operationalise the strategy.

A paper published by the Center for Strategic and International Studies calls for the US military to modernise legacy warfighting systems in order to prepare for future conflicts. The Report basically says that The Department of Defense must adopt new approaches to software design and architecture to help the US military maintain an operational advantage over global its opponents. The report called Software-Defined Warfare says that the architecture needed to develop and maintain the most advanced warfighting systems “lies in software.”

“One of the greatest challenges the DoD and other USs federal agencies face is that they were built from the ground up as industrial-age, hardware-centric organisations... Making the transition to digital age, software-centric, more risk-tolerant organisations is exceedingly difficult. But it is also the only path to future success." the report says.

The paper says that this type of software-defined warfare, where software is at the core of DoD’s operating model, will allow today's military hardware and weapons to better handle “all of the complexity of decision making, targeting and resourcing.”

The report outlines a series of core concepts that DOD should adopt as it works to design and support weapons and accompanying hardware, including moving from vertically-scaled architecture to a horizontally-scaled model that can distribute computing workloads across smaller systems. It goes on to recommend that the DoD should acquire or design “a massive number of cheap, disposable and easy-to-manufacture endpoint systems that it can concentrate, distribute and scale up or down as the need arises,” but that it would require almost no maintenance and could be easily remedied if a system breaks down.

“At the heart of all these large networks of systems, whether autonomous or manually controlled, will be complex, Internet-scale, highly available software that pulls everything together. The underlying software systems will help bind all the DOD’s people, weapons, logistics and intelligence,’ says the Report.

During a recent CSIS Event discussing the report’s release, the paper’s authors, the CIA's Nand Mulchandani and retired Air Force Lt. Gen. John Shanahan, said that DOD’s ability to adopt and optimise updated software and technologies, including Artificial Intelligence models, will help the US maintain a competitive footing with other countries that are modernising their warfighting systems.  

CSIS:     DefenseOne:     NextGov:     US DoD:     US DoD

You Might Also Read: 

British Defence Ministry Gets A Quantum Computer:

 

« The Metaverse: A Reality Check
Hacktivist Group GhostSec Attack Israel »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

Xeliumtech Solutions

Xeliumtech Solutions

Xeliumtech Solutions are a Digital Transformation partner with quality offerings in Mobile App Development, Ecommerce, Devops, RPA, AI, IoT development, Cybersecurity and more.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.