Accessibility Tools

Skip to main content

Access World-Class NIST RMF Documentation with ASP Learn More

Arlington Blog


Stay up-to-date on current and emerging DoD and Federal cybersecurity, privacy and compliance news with Arlington.

'Special Pay' Helping to Keep Pentagon's Elite Cyber Professionals with U.S. Government

Cybersecurity talent is getting harder and harder to come by, but even more challenging to keep in today’s incredibly tight labor market.  As for the federal government, they’re in competition just as much as the private sector when it comes to finding the best and brightest cyber talent.  To help bolster efforts in keeping talent from jumping ship, the U.S. military is pumping millions of dollars into the pockets of federal employees for what they call “cyber retention bonuses.”

U.S. Navy Pushes Forward with Cyberspace Superiority Vision (CSV)

In an effort to continue to keep pace with the changes in warfare - especially with cybersecurity - the Department of Navy (DON) has put forth its Cyberspace Superiority Vision (CSV) - the pursuit of cyberspace superiority guided by three principles - Secure, Survive, and Strike.

Big Cloud Providers to be Tested for Zero Trust Capabilities by DoD Backed Hackers

“We’re going to have the NSA red team, and perhaps even service red teams, attack...“That would be a realistic adversary attack, a controlled attack, and we would determine whether or not the red teams could get and exploit data,” according to Randy Resnik, the Director of the newly established Zero Trust Portfolio Management Office within the Department of Defense (DoD) CIO/CS. 

The DEFIANT X - An Advanced Helicopter Like No Other

It flies twice as fast - and twice as far - as the famed BLACK HAWK.  And it looks quite futuristic. Meet the DEFIANT X.

Per Boeing, DEFIANT X builds on the handling qualities and transformational capabilities proven by SB>1 DEFIANT, a Sikorsky-Boeing technology demonstrator helping to inform the U.S. Army’s future vertical lift requirements. Combined with our team’s unsurpassed experience in mission systems, training and sustainment, DEFIANT X will significantly advance the Army’s air assault capability with limited changes in tactics, techniques, procedures, training and infrastructure.[1]

Detecting and Deterring an Insider Threat - Perspectives from the FBI

According to the FBI, a company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing company property. However, the thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” — someone who is stealing company information or products in order to benefit another organization or country.