The U.S. military will need several years to reset and rebuild its military following the wars in Iraq and Afghanistan, said the deputy secretary of defense.
Needing a new long-range anti-ship missile, the U.S. Navy has configured a Tomahawk cruise missile to perform that role. The service saved a large amount of scarce funding in adapting an existing system instead of developing a new one, stated a high-ranking defense official.
The United States is losing the defense technology advantage it has held since World War II, and that development could have ramifications far beyond the battlespace.
The University of Virginia’s Applied Research Institute has signed an agreement with the Naval Air Warfare Center Aircraft Division to support a variety of research efforts, including cybersecurity and big data analytics.
Returning the defense budget to sequestration levels “would be a disaster,” according to a senior defense official.
In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.
Government, academia and industry all are struggling to find, train and retain the best and the brightest of engineers, scientists and mathematicians, compounding an already difficult challenge, said Katrina McFarland, assistant defense secretary for acquisition.
Lt. Gen. Robert Ferrell, USA, Army chief information officer/G-6 unveiled the publication of the Army Network Campaign Plan.
Mark Orndorff, the mission assurance executive and program executive officer for mission assurance and network operations at the Defense Information Systems Agency (DISA), bids farewell to colleagues today as he retires.
Privacy hasn't disappeared. We've been handing it over bit by bit for years.
A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
Lt. Gen. Vincent Stewart, USMC, has taken command as the 20th director of the Defense Intelligence Agency, making him the first U.S. Marine to take the helm of the military’s spy agency.
The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.
The Twitter and YouTube accounts for U.S. Central Command are back online after hackers, stated to be in support of Islamic State militant group, broke into the accounts and posted menacing messages.
The Defense Information Systems Agency (DISA) is reorganizing to focus on five Cs: cyber, cloud, collaboration, and command and control, Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, announced Monday at a luncheon event hosted by AFCEA's Washington, D.C. Chapter.
While cybersecurity is getting big play in the news these days—as it well should—three topics require just as much attention but have not yet hit the big time. Acquisition, spectrum and interoperability may not have the headline-grabbing charm of the hack into the U.S. Central Command’s Twitter account, but they are issues that need the same serious attention.
In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.
SBIR program manager with U.S. Special Operations Command helps spread the word about small business innovation.
Fire, police and emergency medical personnel in New Jersey will have access to a dedicated first responder network established to ensure priority access and resiliency during natural disasters or attacks.