Cyberwarfare is a primary concern for the U.S. Marine Corps as it continues its rebalance toward the Asia-Pacific region. With the growing involvement of cyber in every operation along with specific concerns of virtual attacks from large nations in the region, emphasis on the new domain is becoming increasingly important.
Concerns about the telecommunications supply chain have led U.S. network providers to institute extensive security procedures, but government officials are looking at establishing formal guidelines for procuring network components overseas—for better or worse.
Fort Bliss, Texas, has installed an unusual mircogrid to help power a dining facility on base, introducing a new approach to the U.S. Army’s efforts to find alternatives to traditional power. The technology is intelligent, optimizing energy usage.
A hand-picked group of Defense Department’s top information technology experts will work with a giant in the cloud computing industry to determine how security will play a part on the military’s migration to the cloud.
The lowest price technically acceptable (LPTA) acquisition strategy, which focuses on price over value, has become the dominant approach that agencies are applying to federal contracting. The accelerated transition to this strategy has been fueled by sequestration and the growing need for government to do business at a reduced cost. Contractors are still learning how to operate in this new environment, but many fear that the emphasis on lower cost labor will reduce the expertise of the work force and result in lower levels of effort.
James Bond’s U.S. counterpart may be equipped more with commercial technologies than with systems developed in intelligence community laboratories. The private sector will be called upon to provide even more capabilities to help keep the intelligence community ahead of adversaries and budget cuts.
Unmanned vehicles may become joint platforms as new software allows operators using a standard control system to use craft employed by different services. So, an Army squad deep in the battlefield may be able to use data accessed directly from a Navy unmanned aerial vehicle to bring an Air Force strike to bear against enemy forces.
A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.