Brig. Gen. Richard G. Kaiser, USA, has been assigned as commander, Combined Security Transition Command-Afghanistan, Operation Freedom’s Sentinel, Afghanistan.
The guidelines for improving cybersecurity on a national scale already are in place. Now, we need commitment on a national scale to implement them.
We are little more than halfway through 2016, and it is safe to say that “regulatory compliance” are the cybersecurity buzzwords of the year. Regulatory compliance is not just a government or specialty market issue. Today, it applies to private contractors offering cloud, Internet of Things and other solutions within the federal marketplace.
Maj. Gen. Jennifer Napper, USA (Ret.), vice president, Defense and Intelligence Group, Unisys Federal Systems, says she respects people willing and able to accomplish the mission regardless of obstacles.
The U.S. Army initiated full and open competition for the Small Airborne Networking Radio (SANR) by releasing a draft request for proposals (RFP). The SANR will replace the ARC-201D radios in the Army’s aviation platforms and provide soldiers with increased data, video, situational awareness, friendly force tracking and voice clarity.
Not surprisingly, as the technology behind unmanned aerial vehicles (UAVs) has increased over the decades, so have their costs. But why do modern-day UAVs and their equipment cost so much? The simple answer: because they can. But that doesn’t mean the cost is justified.
Shortly after getting word of the deadly earthquake that has devastated much of central Italy, the European Space Imaging's satellite tasking operations team collected the first satellite image of the damage at 10:21 a.m. (UTC).
Shannon Sullivan, a retired Air Force lieutenant colonel, learned lessons as an athlete that served him well throughout his active duty career and beyond.
When we think of cyber attacks, we generally picture a lone wolf hacker or Anonymous-type organization. But foreign governments also are formidable threats. Take a moment to scan the headlines and you’ll see that articles about cyber hacks on Sony Pictures Entertainment and the Democratic National Committee—among many others—have been attributed to North Korea and Russia. Blogger Mav Turner from SolarWinds offers pointers on safeguarding networks from increasingly sophisticated intrusions.
The Ohio Bureau of Criminal Investigation (BCI) is investing in cutting-edge DNA testing capabilities to bolster its arsenal to solve missing persons forensic cases, among other tasks. The bureau is working with Battelle, an independent nonprofit research and development organization, and the organization’s technology that provides investigators with new tools for more in-depth DNA profiling.
Government, industry and academia are on the cusp of game-changing breakthroughs in the field of quantum physics.
Master Gunnery Sgt. Arthur Allen III, USMC (Ret.), left active duty this past summer after a 31-year career that included deployments to Desert Shield, Desert Storm, Iraq and Afghanistan. He does not yet know what his next professional position will be, but he knows his life after active duty will include volunteer work.
Air gapping is a security measure that isolates a computer or a network so it cannot be accessed or hacked by an external entity—a useful technique that adds a layer of security. But it's not a foolproof defense method. For that reason, blogger John Halksworth shares tips in the event of a cyber attack or a data breach.
When students studying cybersecurity return to Capitol Technology University in Maryland this fall, cash scholarships donated by a former adjunct professor will aid at least two of them. Nischit Vaidya, CEO of Argotis, is driven by a love of education and a desire to give back to his community.
The U.S. Department of Homeland Security (DHS) Science and Technology (S&T) Directorate has announced the Next-Generation Incident Command System, an information sharing tool for first responders, is now available worldwide.
The Office of Personnel Management announced Tuesday it has appointed David DeVries as its new chief information officer. DeVries now leaves the Defense Department, where he serves as the department's principal deputy chief information officer under Terry Halvorsen.
One often-overlooked aspect of software development is how much programmers rely on open source libraries and packages for prewritten functions. Using the method makes a new program dependent on the existence and availability of that particular module. If that dependency is not available or the code functionality is broken, the entire program fails.
The workload for the Army’s organic industrial base facilities—depots, arsenals and ammunition plants—is nearly the same as it was prior to conflict in Iraq and Afghanistan. For example, Tobyhanna Army Depot is an Army center of excellence for C4ISR, electronics, avionics and missile guidance and control. The Air Force has designated Tobyhanna as its technical repair center for C4I and tactical missiles, and the Marine Corps has declared it the source of repair for their newest radar.
The Army Materiel Command (AMC) is modernizing and deploying pre-positioned stocks in Europe, Africa and Asia Pacific to ensure the service can rapidly and effectively respond to threats as they occur. Those so-called activity sets include the latest in communications and intelligence, surveillance and reconnaissance (ISR) equipment.