Two Companies Awarded Rifleman Radio Contracts

April 30, 2015
George I. Seffers

The U.S. Army has awarded contracts to two vendors—Harris Corporation and Thales Defense and Security Incorporated—for its Handheld, Manpack and Small-form Fit Rifleman Radio. The contract is structured as a five-year base ordering period, plus a five-year optional ordering period multiple award indefinite delivery, indefinite quantity.

Latest Blog Entries

Commerce Department to Lead Cybersecurity Trade Delegation
May 1, 2015
By George I. Seffers

Twenty companies will participate in a trade mission with Romania and Poland.

After We Have Threat Information Sharing Legislation, Then What?
April 29, 2015
By Robert B. Dix Jr.

Proposed cybersecurity legislation is a good start, but much remains to be done to secure the nation from cyberthreats—starting with trust and cooperation among diverse organizations.

'Skip Echelon' Thinking and Innovation for Cybersecurity
April 28, 2015
By Terry Roberts

It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.

Cybersecurity Bucks Being Invested in Shelfware
April 28, 2015
By Maryann Lawlor

Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment. 

Defense Secretary Ashton Carter is Off to a Good Start
April 27, 2015
By M. Thomas Davis

The U.S. Defense Department now has a leader who fully grasps how technology can strengthen the defense base. Yet, bringing the military and the high-technology private sector together is not as easy as it used to be, given cultural differences.

Will Any Meaningful Cyber Legislation Make It to the Presidentís Desk?
April 27, 2015
By Robert Clark

Don't expect important cyber legislation to be sent to the president any time soon. If history is any judge, all that will emerge is a rehash of existing regulations or executive actions codified for public consumption.

Intelligence and the Iranian Framework
April 21, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.

Homeland Security Chief Talks Cybersecurity at Major Conference
April 21, 2015
By Sandra Jontz

Cybersecurity has become a mission of equal importance to the Department of Homeland Security as combating terrorism, Secretary Jeh Johnson shares at the RSA Conference 2015 in California.

The President's Next Cellphone
April 21, 2015
By Justin Marston

Guest blogger Justin Marston tackles the reality that is the current state of classified mobility across the U.S. government—voice and basic email. It’s not what senior leaders want, he writes. They want apps, just like everyone else, but their (justified) level of paranoia has neutered most mobile devices.

Protection of PII Starts With the Person in the Mirror
April 16, 2015
By Glenn Kesselman

Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and web browser.

Additional Entries ...