logo
Army Research Lab Signs Partnership Intermediary Agreement (PIA) With Technology Advancement Center (TAC) to Accelerate Digital Modernization

Army Research Lab Signs Partnership Intermediary Agreement (PIA) With Technology Advancement Center (TAC) to Accelerate Digital Modernization

WASHINGTON, D.C. / ACCESS Newswire / June 4, 2025 / The Technology Advancement Center (TAC), in collaboration with the IT Acquisition Advisory Council (IT-AAC), a subsidiary of the Interoperability Clearinghouse (ICH), has signed a groundbreaking Department of Defense (DoD)-wide Partnership Intermediary Agreement (PIA). This new alliance empowers all DoD components to fast-track digital modernization initiatives in alignment with the President's Executive Order on Defense IT Acquisition reform and Secretary of Defense Peter Hegseth's directive to deliver cutting-edge software capabilities to the warfighter at speed.TAC and IT-AAC
The PIA unlocks a robust portfolio of strategic tools for agencies striving to innovate under budget constraints, including:
The U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory, designated as the executive agent in coordination with the Army CIO, will be the first to operationalize this capability. The task is to drive compliance with federal IT reform mandates and rapidly scale DoD software acquisition pathways with targeted expertise and actionable guidance.
'I'm honored to partner with IT-AAC and the U.S. Army to help accelerate the delivery of emerging technologies to the warfighter. Together, we're creating a faster, more agile pathway for innovation that directly supports mission readiness and operational advantage,' added Gregg Smith, CEO of the TAC.
'Having invested over two decades in advancing Defense IT reforms, we are honored to have an opportunity to work with one of the best CIOs in government to advance Army's top priorities,' stated John Weiler, co-founder of the IT-AAC and the CEO of the Interoperability Clearinghouse.
About TAC and IT-AAC
TAC and IT-AAC provide government program managers and decision-makers with the tools, methodologies, and expertise needed to accelerate digital modernization and transformation. Leveraging elastic, just-in-time Tiger Teams composed of experts from over two dozen leading nonprofits, standards organizations, Fortune 500 companies, and Silicon Valley innovators.
TAC's website is http://www.thetac.tech/.
IT-AAC's website is www.it-aac.org.
Contact Information Gregg Smith Tel: (443) 626-4450 Email:John Weiler 703 863-3766
SOURCE: Technology Advancement Center
press release

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Trump Drops A Cybersecurity Bombshell With Biden-Era Policy Reversal
Trump Drops A Cybersecurity Bombshell With Biden-Era Policy Reversal

Forbes

time29 minutes ago

  • Forbes

Trump Drops A Cybersecurity Bombshell With Biden-Era Policy Reversal

Less than 24 hours after President Trump's public feud with Elon Musk, a new cybersecurity executive order was issued on June 6, 2025, introducing major revisions to the Biden administration's final cybersecurity directives. The order not only modifies key elements of Biden's January 2025 framework but also signals a broader realignment of federal cybersecurity priorities. It shifts focus away from federal digital identity initiatives and revises compliance-heavy software security mandates. Officially titled 'Sustaining Select Efforts To Strengthen The Nation's Cybersecurity And Amending Executive Order 13694 And Executive Order 14144,' the order represents a strategic departure from prior approaches, emphasizing operational pragmatism over regulatory expansion. Notably, it comes at a time when President Trump's nominee to lead the Cybersecurity And Infrastructure Security Agency, Sean Plankey, has yet to be confirmed due to opposition and delay tactics from both sides of the aisle. President Biden's Executive Order 14144 was issued on January 16, 2025, just four days before President Trump's inauguration. It was interpreted by many observers as an effort to define long-term cybersecurity direction before the change in administration. The order included measures to bolster software supply chain security, expand digital identity infrastructure and accelerate post-quantum cryptography adoption. However, this latest Trump order criticized several of these elements as overreaching or insufficiently vetted, characterizing them as 'problematic and distracting' and specifically noting that they were 'sneaked' into policy in the final hours of Biden's presidency. The language used in the accompanying fact sheet is unusually blunt for a federal document, suggesting a clear intent to publicly distance the new administration from its predecessor's policy posture. 1. Attribution Of Threats: Direct Language On Foreign Cyber Aggressors The executive order opens with unusually direct language, identifying the People's Republic of China as the most 'active and persistent' cyber threat to U.S. government systems, private sector networks and critical infrastructure. It also names Russia, Iran and North Korea as continuing sources of malicious cyber activity. This blunt attribution departs from the more generalized threat descriptions of previous administrations. By naming adversaries explicitly in the policy preamble, the administration signals a shift toward greater transparency in threat acknowledgment and a hardening of posture. The message is clear: U.S. cyber strategy is now being framed not only by evolving technologies but by intensifying geopolitical realities. 2. Software Security Compliance: Shifting From Mandated Attestations To Voluntary Implementation: Biden's order imposed a layered framework requiring federal contractors to submit attestations, artifacts and documentation tied to NIST's Secure Software Development Framework. Some would say that these requirements risked turning development teams into compliance teams. Trump's order eliminates attestations entirely. NIST will still provide guidance through the National Cybersecurity Center Of Excellence, but reporting is no longer mandatory. This reflects a shift toward flexibility over formality. 3. Digital Identity Verification: A Full Repeal Rooted In Fiscal And Legal Concerns: The Biden administration had envisioned digital credentials as a gateway to streamlined government services. Trump's order reverses course, citing concerns about entitlement fraud and improper access. The fact sheet explicitly warns that Biden's policy could have enabled unauthorized immigrants to obtain digital IDs. As a result, pilots on interoperability and identity federation are halted. 4. Artificial Intelligence In Cybersecurity: Tighter Focus On Defense And Vulnerability Management: Biden's order encouraged AI-driven collaboration across academia and industry. Trump's order takes a narrower view. It requires agencies to track vulnerabilities in AI systems, integrate them into incident response pipelines and limit data sharing to only what is feasible under security and confidentiality constraints. AI is repositioned as a potential liability to be secured, not a universal defense engine. 5. Post-Quantum Cryptography: A Deadline Remains But The Path Is Streamlined While both administrations agree on the risk posed by quantum computing, Trump's order simplifies the roadmap. By December 2025, CISA and NSA must publish a list of product categories ready for quantum-safe encryption. TLS 1.3 or its successor must be adopted by 2030. Oversight is split between NSA for national security systems and OMB for civilian agencies. 6. Cyber Sanctions Policy: A Narrowed Scope One of the more politically sensitive changes lies in how sanctions are applied. Biden's order allowed for cyber sanctions against any person involved in disinformation or cyber-enabled threats. Trump's revision limits this to foreign persons only. Domestic political activity is explicitly excluded, a move the administration describes as a safeguard against misuse of cyber enforcement tools. Initial industry feedback has been swift. The executive order's reorientation of cybersecurity priorities is already reverberating across the federal ecosystem, private sector and innovation community. From compliance-light procurement to a tighter national focus on AI risk, the changes are reshaping expectations. Defense integrators and established IT vendors are among the most immediate beneficiaries. By removing detailed compliance documentation, particularly attestations tied to secure software development, the order reduces friction in procurement and lowers operational risk. Contract cycles may accelerate as audit-readiness gives way to implementation focus. This shift rewards incumbents with mature delivery models and embedded federal relationships. With CISA's role redefined and federal oversight of digital identity rolled back, state and local governments may gain more autonomy to design cybersecurity programs that fit local contexts. For well-resourced jurisdictions, this could spur innovation. But for others, especially those lacking talent or funding, decentralization could create new coordination gaps. Additional federal guidance may be needed to prevent fragmentation in national critical infrastructure protection. For enterprises, the EO's elimination of standardized compliance frameworks is a mixed bag. Under the previous EO, the bar for secure software delivery was clear, particularly for organizations that invested in transparency and attestation. Without a common benchmark, proving trustworthiness becomes more subjective. Kevin Bocek, CyberArk's Senior Vice President of Innovation, emphasized that the industry is entering a new era of cybersecurity not only dominated by AI and automation, but also by emerging risks that are not yet widely addressed. 'It is affirming that the EO is serious about safe and secure AI, hopefully laying the foundation to critically address one of the most urgent and overlooked threats: machine identity sprawl,' Bocek noted. According to CyberArk, machine identities now outnumber human identities 82 to 1 within enterprises, yet 68% of organizations lack security controls to protect them. Without federal guidance and clear identity accountability, Bocek warns that this vulnerability could become a significant blind spot in national cybersecurity. His comments underscore the risk of prioritizing operational efficiency over foundational security controls, a concern shared by many CISOs facing exponential identity growth from cloud and AI platforms. Digital identity initiatives long supported by privacy advocates, civic technologists and digital modernization leaders were seen as critical to enabling secure, user-friendly access to government services. They aimed to streamline verification, reduce fraud and close equity gaps in federal access. The Biden administration had embraced digital IDs as the backbone of modern digital government. The Trump administration, however, rescinded these efforts. The accompanying fact sheet expressed concerns that digital identity mandates could be exploited to extend entitlements improperly, particularly to unauthorized immigrants. This decision reflects a broader skepticism toward centralized identity infrastructure and a desire to limit the federal government's role in managing citizen-level credentials. The Biden-era policy positioned artificial intelligence as a strategic asset for defense, encouraging public-private collaboration, dataset sharing and predictive threat detection at scale. The Trump administration's new directive narrows that scope significantly. Instead of promoting AI as a systemwide defense multiplier, the EO limits AI's use to managing system vulnerabilities and tracking indicators of compromise. This reflects concerns about over-reliance on technologies that are still evolving, opaque and in some cases unregulated. As Bocek noted, 'Proper AI development is a tool for predictive defense,' but without protections for the AI itself, it could become a new risk vector. The administration's position is clear: AI should be secured before it is scaled. This AI reframing also signals a philosophical divergence between leveraging AI as a force for innovation versus containing it as a potential liability. Whether that caution slows adoption or increases security maturity remains to be seen, but the message is unambiguous: the era of unchecked AI optimism in federal cybersecurity is over. This executive order is not a one-off. It is part of a broader realignment consistent with the principles laid out in Project 2025, a policy blueprint advocating for streamlined federal governance, stronger executive control, and targeted decentralization of agency authority. More orders are expected, particularly in areas such as offensive cyber capabilities, state-level infrastructure resilience, and the restructuring of agencies like CISA. Trump's June 2025 cybersecurity order is more than a policy shift. it is a recalibration of federal cyber strategy that prioritizes execution over oversight, industry collaboration over mandates, and sovereignty over standardization. For industry leaders, innovators, and government stakeholders alike, the takeaway is clear: cybersecurity is no longer just about compliance. It is about preparedness, adaptability, and national competitiveness in an AI-driven world. The next wave of policy will not be about fine-tuning compliance frameworks but will be about defending digital sovereignty. Those who can pivot fastest, and secure what matters most, will shape the next chapter of America's cyber future.

Trump signs Executive Order to ‘unleash American drone dominance'
Trump signs Executive Order to ‘unleash American drone dominance'

Business Insider

time12 hours ago

  • Business Insider

Trump signs Executive Order to ‘unleash American drone dominance'

President Donald Trump signed an Executive Order to 'ensure continued American leadership in the development, commercialization, and export of unmanned aircraft systems – otherwise known as drones,' the White House announced. 'The Order directs the Administrator of the Federal Aviation Administration to expand drone operations by enabling routine 'Beyond Visual Line of Sight' drone operations for commercial and public safety missions, and to accelerate the development, testing, and scaling of American drone technologies, including advanced air mobility and autonomous operations. The Order establishes an electric 'Vertical Takeoff and Landing' integration pilot program to accelerate the deployment of safe and lawful vertical operations in the United States, selecting at least five pilot projects to advance applications like cargo transport and medical response,' the White House stated. Companies working on drones or low-altitude urban aircraft known as eVTOLs include AeroVironment (AVAV), Joby Aviation (JOBY) and Archer Aviation (ACHR). Confident Investing Starts Here:

Trump signs Executive Order intended to ‘strengthen the nation's cybersecurity'
Trump signs Executive Order intended to ‘strengthen the nation's cybersecurity'

Business Insider

time12 hours ago

  • Business Insider

Trump signs Executive Order intended to ‘strengthen the nation's cybersecurity'

President Donald Trump signed an Executive Order to strengthen the nation's cybersecurity by 'focusing on critical protections against foreign cyber threats and enhancing secure technology practices,' the White House announced. The Order 'amends problematic elements of Obama and Biden-era Executive Orders' and directs the Federal government to advance secure software development, the White House stated. Publicly traded companies in the cybersecurity space include Check Point (CHKP), CrowdStrike (CRWD), CyberArk (CYBR), F5 Networks (FFIV), Fortinet (FTNT), Gen Digital (GEN), Okta (OKTA), Palo Alto Networks (PANW) and Qualys (QLYS). Companies working in the quantum computing space include D-Wave Quantum (QBTS), Quantum (QMCO), Rigetti Computing (RGTI), Sealsq (LAES), Quantum Computing (QUBT) and Honeywell (HON). Confident Investing Starts Here:

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store