Army chooses Akamai for cutting-edge battlefield zero trust project: T-ICAM

April 7, 2024
1 min read

TLDR:

  • The Army has selected Akamai to develop prototype cybersecurity software for combat units under the T-ICAM project.
  • T-ICAM aims to bring modern “zero trust” cybersecurity to battlefield networks, allowing for individualized access based on user roles.

The Army has chosen cloud and edge-computing company Akamai to create prototype cybersecurity software for combat units as part of the T-ICAM project. This project, Tactical Identity Credential & Access Management, is a crucial step towards implementing “zero trust” cybersecurity measures in the military. By leveraging Akamai’s expertise in accelerating internet connections for civilian consumers and businesses, the Army aims to enhance the security of its tactical networks. The software will be tested by combat units in field trials and is scheduled for a larger rollout in 2025. This initiative represents a shift from traditional acquisition methods, utilizing the Software Acquisition Pathway and Other Transaction Authority contract to streamline the process.

The T-ICAM project focuses on modern cybersecurity techniques that assume network breaches are inevitable and therefore monitor user activity closely to ensure that access is granted only to necessary resources. This approach aims to mitigate risks associated with stolen or compromised credentials, a common vulnerability in traditional cybersecurity practices. The implementation of Identity, Credential, & Access Management (ICAM) in tactical settings presents unique challenges due to the rugged nature of devices and unreliable network connections in battlefield environments. The Army’s selection of Akamai for this project signals a strategic partnership aimed at enhancing cybersecurity measures for combat units operating in challenging operational environments.

The ultimate goal of the T-ICAM project is to extend commercial ICAM capabilities to tactical units, providing secure and efficient network and data access to authorized users even in harsh operational conditions. By integrating zero-trust cybersecurity principles into battlefield networks, the Army aims to bolster its defenses against cyber threats and ensure that sensitive data remains protected. This initiative represents a significant step towards modernizing the Army’s cybersecurity posture and aligning with evolving threats in the information age.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses