Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
SIGNAL Online Exclusives
The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.
The U.S. military can get a bird's-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles. Now, DARPA is asking for technology that would let the military get into buildings without having troops actually step foot inside.
With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.
After witnessing the depressing impact of starvation and lack of medicine for Syrian refugees encamped in Turkey, Maj. Mark Jacobsen, USAF, embarked on a project that he hopes one day will use unmanned aerial vehicles to airdop lifesaving supplies for victims of war-ravaged nations.
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.
Technology plays a central role in helping the Department of Veterans Affairs work smarter, not harder, to medically treat veterans, particularly those who live in rural areas of the nation.
Intel Security partnered with Discovery Education to launch a three-year national education initiative with a goal of reaching at least 35 million students with a brand new program to teach safe cyberpractices. “Think Before You Link” is the first and only Discovery Education-supported initiative to focus on cybersecurity education with a first of its kind digital safety curricula.
The U.S. Army has not begun using a 3-D printer for food—yet. But scientists at the Natick Research Center have the idea and the funding to research the potential capabilities of 3-D food printers.
The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.
A five-year project funded by the Defense Department’s research arm and developed by Northrop Grumman Corporation has netted the world’s fastest integrated circuit amplifier and a place in the record books.
Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday hosted by the Fairfax County Chamber of Commerce, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.
The U.S. Navy is capitalizing on a first-of-its-kind autonomous technology that can transform just about any surface vessel into an unmanned platform able to protect other ships or “swarm” hostile vessels.
The U.S. Army’s Rapid Equipping Force (REF), which quickly fields technologies to meet urgent warfighter needs, intends by the end of November to open an office in Kuwait that will serve warfighters in the Middle East and Southwest Asia.
The recent rash of cyber attacks on major U.S. companies has drawn renewed focus on network vulnerabilities, both in commercial and governmental sectors, and not just on external attackers but on potentially more ominous threats posed by insiders. Hackers are looking for self-identified privileged users who broadcast on social media sites their career positions.