Brad D. Williams
Reporter, Cyber and Networks, Breaking Defense
Brad D. Williams covers cyber, networks, and emerging tech. He has worked as a journalist and tech writer for 20 years, much of that time focusing on cybersecurity. He began his career on the night desk at a daily newspaper and then spent a decade as a senior tech writer in security operations centers, on cyber red teams, and embedded with engineers building tech for the public and private sectors. In 2015, Brad started a business specializing in cybersecurity content strategy and development. He joined Fifth Domain: Cyber at the publication’s launch in 2017 and developed an enterprise beat covering cybersecurity strategy, policy, operations, and emerging tech. Brad holds a master's degree in English and technical cybersecurity certification. Outside of work, Brad is a member of the United States Chess Federation and writes literature. bwilliams@breakingmedia.comStories by Brad D. Williams
VMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.
By Brad D. Williams
Reagan Institute warns of “inadequate” investments, “exceedingly fragile” supply chains, and “insufficient” accountability of government officials, among other US weaknesses.
By Brad D. Williams
Google’s addition is somewhat surprising since, in recent years, the company has pulled away from DoD work due to internal pressure on executives from its workforce. The apparent omission of IBM is also notable.
By Brad D. Williams
“I hear more about IT revolution than evolution these days, but I think IT is more evolution,” DIA CIO Doug Cossa said.
By Brad D. Williams
“There’s one line [in the notice] that should scare the hell out of everyone everywhere,” Chris Krebs said.
By Brad D. Williams
Lt. Gen. Moore didn’t provide details, but later said, “China is the number one priority for DoD. Therefore, it’s [CYBERCOM chief] Gen. Nakasone’s number one priority.”
By Brad D. Williams
DoD said it will be “increas[ing] oversight of professional and ethical standards of third-party assessors.”
By Brad D. Williams
“Strategic competition is alive and well in cyberspace, and we’re doing it every day with persistent engagement,” the CYBERCOM and NSA leader said.
By Brad D. Williams
Prior to the Army Digital Transformation Strategy, “What we lacked in the Army was an integrator… a unity of effort to modernize. That’s what the DTS is about,” CIO Raj Iyer said.
By Brad D. Williams
“The ultimate goal is understanding exactly what is happening on the network, who is connecting, what is connected, and what are those devices and users doing on the network so you can make sure that, where connection is necessary for a mission, it’s available but also that it’s secure,” Forescout’s Dean Hullings said.
By Brad D. Williams
“If there’s one thing DoD and industry have done, it’s try a whole bunch of different tools over the last 10 to 12 years. What we have to do now is string them all together to show which ones work best for the capabilities the Army needs today and divest the ones that they don’t need,” Peraton VP Jennifer Napper said.
By Brad D. Williams
“So I think [the concept of integration is] so simple and yet so hard to achieve,” Northrop VP Walsmith said. “You need to be able to integrate applications, whether they’re your own or someone else’s, with ease and simplicity. It is easy to say. It’s very hard to engineer.”
By Brad D. Williams
“I will offer you there will be no sanctuary in the next fight. We have to have a resilient network,” Lt. Gen. John Morrison said.
By Brad D. Williams
“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams
VMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.
By Brad D. WilliamsReagan Institute warns of “inadequate” investments, “exceedingly fragile” supply chains, and “insufficient” accountability of government officials, among other US weaknesses.
By Brad D. WilliamsGoogle’s addition is somewhat surprising since, in recent years, the company has pulled away from DoD work due to internal pressure on executives from its workforce. The apparent omission of IBM is also notable.
By Brad D. Williams“I hear more about IT revolution than evolution these days, but I think IT is more evolution,” DIA CIO Doug Cossa said.
By Brad D. Williams“There’s one line [in the notice] that should scare the hell out of everyone everywhere,” Chris Krebs said.
By Brad D. WilliamsLt. Gen. Moore didn’t provide details, but later said, “China is the number one priority for DoD. Therefore, it’s [CYBERCOM chief] Gen. Nakasone’s number one priority.”
By Brad D. WilliamsDoD said it will be “increas[ing] oversight of professional and ethical standards of third-party assessors.”
By Brad D. Williams“Strategic competition is alive and well in cyberspace, and we’re doing it every day with persistent engagement,” the CYBERCOM and NSA leader said.
By Brad D. WilliamsPrior to the Army Digital Transformation Strategy, “What we lacked in the Army was an integrator… a unity of effort to modernize. That’s what the DTS is about,” CIO Raj Iyer said.
By Brad D. Williams“The ultimate goal is understanding exactly what is happening on the network, who is connecting, what is connected, and what are those devices and users doing on the network so you can make sure that, where connection is necessary for a mission, it’s available but also that it’s secure,” Forescout’s Dean Hullings said.
By Brad D. Williams“If there’s one thing DoD and industry have done, it’s try a whole bunch of different tools over the last 10 to 12 years. What we have to do now is string them all together to show which ones work best for the capabilities the Army needs today and divest the ones that they don’t need,” Peraton VP Jennifer Napper said.
By Brad D. Williams“So I think [the concept of integration is] so simple and yet so hard to achieve,” Northrop VP Walsmith said. “You need to be able to integrate applications, whether they’re your own or someone else’s, with ease and simplicity. It is easy to say. It’s very hard to engineer.”
By Brad D. Williams“I will offer you there will be no sanctuary in the next fight. We have to have a resilient network,” Lt. Gen. John Morrison said.
By Brad D. Williams“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams