Defence
MI5 is off to the cloud; GCHQ is ramping up Computer Network Exploitation capabilities; MI6 needs cultural changes to get a new IT platform running smoothly...
IBM is providing a custom "Asset, Configuration, Patching and Vulnerability” service with a special focus on vulnerability management.
Hey criminals! Fire an HTTP GET request. Grab system memory including session cookies issued post-authentication. Don't worry about logs. Pillage and loot. Thanks, Citrix.
"We are actively investigating the incident and coordinating with law enforcement and regulatory authorities.”
The UK intends to “adopt a collaborative approach with the Netherlands” on some of the acquisitions with an eye to NATO interoperability.
"NATO finds the organically grown ‘IT garden’ in need of some pruning, cleanup, and restructuring. My focus is to pivot to a centrally anchored Enterprise Architecture..."
"Our ability to collect data risks overmatching the ability of our analysts to analyse and exploit it at the speed we need"
An exciting greenfield CIO role + £9k tax free per month and a real challenge...