MilitarySpot.com

Serving the U.S. Army, Navy, Air Force, Marines, Coast Guard and National Guard

Follow MilitarySpot:
 
  • Home
  • Enlist
    • Join The Army
    • Join The Navy
    • Join The Air Force
    • Join The Marines
    • Join The Coast Guard
    • Join The National Guard
    • ASVAB
    • Army Physical Fitness Test
    • Military Draft
    • Prior Service Army Enlistment
  • Career
    • Join the Military
    • Jobs for Military and Civilians
    • Career Center
    • Prior Service Army Enlistment
    • Criminal Justice
  • Education
    • Online Schools
    • Spouse Education Benefits
    • GI Bill
    • Military Schools
    • Criminal Justice
  • Benefits
    • Army Benefits
    • Navy Benefits
    • Air Force Benefits
    • Marine Corps Benefits
    • National Guard Benefits
    • Coast Guard Benefits
    • Veteran Benefits
    • Basic Pay Rates
    • Allowances
    • Special & Incentive Pay
    • Military Spouse Education Benefits
    • VA Education Benefits
    • GI Bill
  • News
    • Headline News
  • Finance
    • Debt Relief
    • Military Pay Rates
    • Military Personal Loans
    • VA Loans
    • Military Star Card
    • Military MyPay
  • Spouses
    • School Finder
    • Scholarships & Grants
    • PCS, DITY, & Moving
    • Pay Rates
    • MyCAA
    • Education Benefits
  • Community
    • Military Games
    • Military Reunions
    • Classifieds
    • Photo Gallery
    • Buddy Finder
    • MilitarySpot Pinups
    • Military Bases
  • Resources
    • Military Alphabet
    • Military Reunions
    • Military Acronyms
    • Currency Converter
    • Military Tools
    • Ranks
    • Military Time
    • Military Tactics
    • Military Discounts
    • Military Games
    • Military Videos
    • Photo Gallery
    • Infographics
    • How To
  • Travel

Assume Networks Are Compromised, DoD Official Urges

SEPTEMBER 26, 2019 – No matter how secure a computer network or the environment it’s used in may seem to be, users should just assume it’s compromised, the deputy undersecretary of defense for research and engineering said.

“This is something I’m very much behind,” Lisa Porter said during a panel discussion yesterday at the Center for Strategic and International Studies in Washington.

During her time as the first director of the U.S. Intelligence Advanced Research Projects Activity, Porter said, she saw a growing emphasis on cybersecurity. The organization was created in 2008.

“At that time, cybersecurity became really, really important,” she said. “It had been important before, but people were really emphasizing it. And unfortunately, there was a huge emphasis on primitive defense models.” The thinking at the time, she said, was that as long as perimeters were put in place, everything inside would be safe, including the data and the networks.

That turned out to not be true, Porter said, and security requires more than just building a barrier around the network.

“It leads you to a false sense of security. … Think ‘Edward Snowden,'” she said. “So then we said, ‘Maybe this perimeter defense model has some flaws in it.'”

Instead, Porter said, users should assume the network is compromised already – either from outside or from bad actors on the inside.

“When you change your mindset to … ‘I have to assume that my networks aren’t trusted – that no matter where I am, I have got to go in with an assumption that I can’t trust what I am using as the backbone of my communications – it changes how you think about the technological solution,” she said.

Now, she said, cyber professionals are thinking about “zero-trust architecture,” which assumes that no one who uses the network can be trusted. In such a setup, users might be allowed access only to that information and those applications that they are pre-authorized to use. Past network security might have put a wall around the whole network, and once inside, a user would free rein to move about. A zero-trust environment uses “microsegmentation,” which divides the network into smaller zones, each requiring special access.

“I think we’ve been lulling ourselves into a false sense of security by thinking we can build perfectly secure enclaves,” Porter said. “There is no such thing as a secure system. So we have to deal with that reality whether we are doing cyber, whether we are doing supply chain, whether we are doing 5G. You will see the zero-trust reference across many of [the Defense Department research and engineering] domains, because we are really trying to advocate for that perspective.”

BY C. TODD LOPEZ

Comments

Filed Under: News

  • News
  • Enlist
  • Education
  • Career
  • Finance

Army Year in Review 2025

DECEMBER 15, 2025 — As 2025 draws to a close, the United States Army reaffirmed its commitment to Soldiers after another incredible year. Throughout the year the Army spent 2025 preparing for a bigger and better 2026, elevating the Soldier experience and awarded performance for life-saving and historic actions. PREPARING FOR THE FUTUREThe U.S. Army […]

Air National Guard Unveils New Bonus Program

MARCH 11, 2023 – On March 1st, the Air National Guard (ANG) launched a new bonus program to attract and retain personnel in critical specialties. The initiative offers significant financial rewards, with bonuses of up to $90,000 for eligible members, depending on their Air Force Specialty Codes (AFSCs). This strategic move aims to strengthen the […]

Military Students’ Tips to Balance Service and Studies

OCTOBER 10, 2025 – Studying in college while serving in the military can be highly rewarding but also extremely demanding in some respects. Military members, veterans, and their families typically balance demanding duty schedules, deployments, family responsibilities, and school schedules. It requires careful planning, flexibility, and being willing to seek and take advantage of available […]

Former Soldier Navigates Job Hunt

NOVEMBER 19, 2024 — In early 2017, Michael Quinn endured what he called the worst day in the worst year of his life. Quinn, then a sergeant major and 24-year Army Soldier, had weathered deployments in Iraq, Afghanistan and the Philippines. As an Army counter-intelligence agent, he said he learned to operate under grave circumstances […]

How Military Families Can Avoid Financial Panic During a Shutdown

OCTOBER 23, 2025 – Government shutdowns create unique challenges for military families who live on tight budgets, frequently relocate, and manage the constant demands of military service. While the uncertainty can feel overwhelming, following these five strategies can help you navigate the crisis with confidence. Keep Perspective.  This financial disruption will end, just as the […]

Recent Posts

  • Army Year in Review 2025
  • DoW Leader Honors Fallen
  • Navy Releases Review of Osprey Airworthiness
  • Leaders Attend Spacecom Relocation Ceremony
  • Army-Navy Student Exchange Program
MAINMENU




SITESEARCH
Can't find something? Try using our site search to dig through our entire site.



Still having trouble? Try the Advanced Search to refine your searches.
NEWSLETTERSUBSCRIBE
Sign Up To Receive Information, Updates and Special Officers from MilitarySpot.com.



Don't miss an issue! Jump in the Newsletter Archives to catch up on previous issues.
FOLLOWMILITARY SPOT

Follow us on Facebook, Twitter & StumbleUpon and more. Keep up with MilitarySpot.com news & updates. We also have an RSS Feed.

Advertise | About | Contact | Feedback | Unsubscribe | DMCA | Privacy Policy | Terms of Use
 
Copyright 2004-2025 Sun Key Publishing. All Rights Reserved.



 
This is not the official recruiting website of the U.S. Military. The site you are on is run by Sun Key Publishing, a private company, and is not endorsed by or affiliated with the U.S. Military.