UPDATE: The U.S. Congress voted late Friday to fund the Department of Homeland Security, but could only reach an agreement to fund the DHS for one week.
Logos Technologies, Fairfax, Virginia, has received a Phase II Small Business Innovation Research (SBIR) award from the Defense Advanced Research Projects Agency (DARPA) to continue development of the SilentHawk military motorcycle in partnership with Alta Motors.
In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.
Secretary of Homeland Security Jeh Johnson voiced a hesitant optimism Thursday that U.S. Congress will come together to fully fund the department before tomorrow’s deadline that could shutter parts of the Department of Homeland Security.
Nations plan to launch more than 500 small satellites over the next five years, an increase of two-thirds in the number of the small space-bound platforms when compared with launches over the past decade, according to an international space firm report.
Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.
The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.
A group of 144 universities warned Congress that pending legislation to address patent litigation abuses is so broadly drawn that it would weaken the nation’s patent system and hinder the flow of groundbreaking advances from universities to the private sector.
The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.
Researchers at the National Institute of Standards and Technology are developing measurement tools for new mobile communications channels that could offer more than 1,000 times the bandwidth of today’s cellphone systems.
The three sea services are facing different challenges with cyber operations, but they are adopting some similar solutions as they wrestle with the newest warfighting domain.
Already dealing with an expanded mission set, the U.S. Coast Guard is facing new challenges as economic conditions generate different types of stresses on existing assets and capabilities.
The Navy’s mission set is likely to continue to grow over the foreseeable future, but the same cannot be said of the fleet. Both surface ships and submarines will need to be replaced or complemented, but budget restrictions severely hinder the Navy’s ability to meet those goals.
The U.S. Marine Corps needs more amphibious ships as it returns to its roots amid tight budgets. The Corps also needs to lighten the load its warfighters bear, and it wants to be able to access advanced intelligence data from its most sophisticated platform.
China is flexing its muscles and projecting power far beyond its traditional realm, but North Korea poses a bigger threat by nature of its irrational leadership.
Humanitarian assistance/disaster relief (HA/DR) has become so important a part of U.S. operations in the Asia-Pacific region that experts now are viewing it as a military doctrine and striving to improve it.
India, a nonaligned nation long reluctant to involve itself in the geopolitics of the Asia-Pacific region, has begun to increase its involvement with the United States and other nations of the dynamic region.
Viewed as an indispensable force for peace and security in the Asia-Pacific region, the United States risks losing the support it enjoys from nearly every nation in that hemisphere if it is ambiguous and not willing to take a stand during crises, said defense experts.
The U.S. Navy is exploiting its own assets and other capabilities to defend and protect against cyberthreats. Some of these internal assets include automated triggers in networks as well as advanced intelligence sources.
The U.S. Navy is facing new and better cyber adversaries as it expands its own cyber footprint. These threats face the fleet and the nation, and the Navy may be called upon to respond in both cases.