HANSCOM AIR FORCE BASE, Mass. (AFNS) -- The Enterprise-IT-as-Service team headquartered at Hanscom Air Force Base, reached a significant milestone in information technology by allowing Airmen direct access to the enterprise edge utilizing commercial cloud environments at six Air Force installations.
Topic: Defense Information Systems Agency (DISA)
An agency under the US Department of Defense was hit by a data breach that affected personal information. Hackers stole Social Security numbers, names and other personal data, a department spokesman said Thursday.
In response to a DOD Chief Information Officer (CIO) directive, the Defense Information Systems Agency Services Development Directorate deployed Department of Defense Secure Access File Exchange (DOD SAFE) Aug. 15. DOD SAFE, a replacement for the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC) Safe Access File Exchange
Striking a balance between mobile device security and user needs is a constant challenge for the Defense Information Systems Agency's (DISA) DOD Mobility Unclassified Capability program management office (DMUC PMO).
eMASS training sessions are offered monthly in the National Capital Region (NCR). All trainings are administered at no cost by vendor representatives. Classes are first come first serve. You will receive a confirmation email once you have been added to the class. To attend DISA-sponsored monthly training, you may sign up via the DISA IASE Classroom
A new cyber assessment program, known as a Command Cyber Operational Readiness Inspection (CCORI), focuses on providing combatant commands and federal agencies with a greater understanding of the operational risk their missions face because of their cybersecurity posture.
The Risk Adjudication and Connection Division offers both recorded and live training to Department of Defense (DOD) and non-DOD entities seeking to establish, re-accredit, or re-certify their connections to the Defense Information Systems Network (DISN). These training sessions are designed to reduce the frustrations and to provide support to those
(.mil/.gov ONLY) The increasing technological sophistication of the Department of Defense (DoD) leads to a dependency on technology that, in turn, represents potentially crippling vulnerabilities. DoD is dependent upon advanced weapon systems and Command, Control, Communications, Computers, and Intelligence (C4I) systems throughout all mission areas from