The Latest in IT Security

Military acquisition rules hamper U.S. ability to counter cyber threats

20
May
2014

By Andrea Shalal COLORADO SPRINGS, Colo. (Reuters) – U.S. military experts on Monday said current acquisition rules hamper their ability to respond quickly to a growing number of cyber attacks against U.S. weapons and computer networks and new approaches are needed. Kristina Harrington, director of the signals intelligence directorate at the National Reconnaissance Office (NRO), said acquisition programs typically take about two years to initiate and execute, but rapidly changing threats in the cyber domain require a different approach. The current acquisition process is not fast enough to keep up with the speed (of the threat), Harrington said at a space and cyber conference hosted by the Space Foundation.

Comments are closed.

Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments