How To Protect The Growing Internet Of Battlefield Things (From Fifth Domain)
Soon, everything and everyone on the battlefield will be connected, often carrying multiple sensors, computers and communications devices. This emerging Internet of Battlefield Things (IoBT) will transform the American way of war. But at the same time, it could create enormous cyber vulnerabilities for DoD as unauthorized and insecure devices are connected to defense networks. It is imperative that the Pentagon implement a security framework that allows only authorized and properly secured devices to access defense networks. Enter Comply-to-Connect (C2C). DoD created C2C as part of its overall strategy for continually monitoring networks even as the number of devices they support grows almost exponentially. Congress directed DoD to implement C2C in 2016. The Pentagon has done pilot studies that prove its effectiveness. Yet, while DoD has made C2C a central element of its network security strategy, it has failed to commit the necessary resources to actually deploy proven solutions. The incoming Secretary of Defense, Mark Esper, needs to make funding a robust C2C deployment one of its first priorities. I have written more on this subject here.
Find Archived Articles: