The U.S. Army is procuring Motorola’s WAVE software technology to fill a need for a unified application that links two-way radios, smartphones, telephones and personal computers together for seamless communications. The $14.1 million contract provides the Army with unlimited access to the capability. WAVE will act as the glue to patch together devices normally incapable of communicating with one another.
The Department of Defense plans to leverage open source solutions and services to meet mission requirements, no matter where the tactical edge lies. Guest blogger Bob Kimball highlights how providing connectivity that enables high-performance, assured networking is not only critical, but the reason why defense and civilian agencies are closely examining software-defined networking as a solution.
Cyber training must include helping build high-level leaders who can pave the way into the cybersecurity future.
Strong legal issues must be addressed before companies take cyber active defense into their own hands.
Acquisition reform remains a long-sought goal of defense procurement experts, but their efforts have a greater urgency as the existing system threatens the very existence of the defense industrial base.
New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission.
Two headline dominating events—the Iranian nuclear accord and the Chattanooga shootings—have significant implications for the public debate about U.S. intelligence.
Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs.
In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.
Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.
The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.
The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...
The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.
Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.
Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?
At a time when the U.S. critical infrastructure is at its most vulnerable point, the Department of Homeland Security is moving away from cooperation and coordination with the private sector.
The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.
The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.
The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.
NIST published today its final guidelines for federal agencies to use when they provide unclassified but sensitive information to nonfederal workers, such as contractors or universities that work with the government.