Mark Orndorff, the mission assurance executive and program executive officer for mission assurance and network operations at the Defense Information Systems Agency (DISA), bids farewell to colleagues today as he retires.
Privacy hasn't disappeared. We've been handing it over bit by bit for years.
A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
Lt. Gen. Vincent Stewart, USMC, has taken command as the 20th director of the Defense Intelligence Agency, making him the first U.S. Marine to take the helm of the military’s spy agency.
The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.
The Twitter and YouTube accounts for U.S. Central Command are back online after hackers, stated to be in support of Islamic State militant group, broke into the accounts and posted menacing messages.
The Defense Information Systems Agency (DISA) is reorganizing to focus on five Cs: cyber, cloud, collaboration, and command and control, Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, announced Monday at a luncheon event hosted by AFCEA's Washington, D.C. Chapter.
While cybersecurity is getting big play in the news these days—as it well should—three topics require just as much attention but have not yet hit the big time. Acquisition, spectrum and interoperability may not have the headline-grabbing charm of the hack into the U.S. Central Command’s Twitter account, but they are issues that need the same serious attention.
In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.
SBIR program manager with U.S. Special Operations Command helps spread the word about small business innovation.
Fire, police and emergency medical personnel in New Jersey will have access to a dedicated first responder network established to ensure priority access and resiliency during natural disasters or attacks.
Outside the world of government, video traffic is mostly about watching clips on YouTube and streaming a favorite Netflix series. Within the government, particularly the Defense Department, video traffic—more specifically videoconference calling—often is far more mission critical.
Rear Adm. Mathias W. Winter, USN, has taken the helm of the Office of Naval Research, where he will oversee the nearly $2 billion Navy Department budget for science and technology programs and serve as the director of Innovation Technology Requirements and Test and Evaluation.
So the countdown is on … the countdown for a new year, new challenges and new triumphs. During 2015, the nation’s top weather experts are slated to get a new weather satellite. The Pentagon will get a new chief. The Army will get at least four new uniforms. But before we look into the future, we highlight DARPA's video countdown that sums up 2014.
Industry and hobbyist groups have partnered with the federal government to launch a campaign geared toward educating the soaring number of drone enthusiasts who are taking to the skies.
U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
Engineering competition challenges middle school, high school and college students to identify a problem or process that needs improvement and offer solutions using a wireless technology.
Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.