Zero trust, a new cybersecurity paradigm, assumes networks are always at risk. As a result, continuous validation of users, devices and access is needed.
The Defense Information Systems Agency sees itself playing an expanding role in JADC2, but there are questions about the future of legacy command and control programs.
A badly needed war-fighting cloud capability ran into delays. The Pentagon's even more lucrative "crown jewel" IT project might face a protest because of its high price tag, but there are signs that it won't generate as much controversy, experts say.