When COVID-19 started ravaging the U.S. travel industry economically, the Transportation Security Administration’s (TSA's) contracting and procurement division had to put gear into place to prevent the spread of the virus in environments that are literally the hub for millions of customers every day. Bill Weinberg, the assistant administrator for contracting and procurement, who began at the agency this month, understands the organization must continue to move quickly to ensure both the security and the safety of both its passengers and the agency’s workforce.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has reorganized its research and development (R&D) structure to more rapidly transition technology capabilities into operations and respond to emerging threats.
William N. Bryan, the senior official performing the duties of the undersecretary for science and technology, DHS, explains the revitalized configuration enhances the focus on the needs of the DHS operational components and homeland security operators across all levels of government.
Apps are one of the main channels consumers use to interact with your business, and nearly every business has one. Because of this, apps are an evident touch point of vulnerability. Cybercriminals have become increasingly sophisticated over the past few years, making app hacks difficult to spot. In fact, most organizations find out too late they’ve been hacked and are left to deal with damage control.
But how can you tell if your company’s app has been compromised? Keep an eye out for these three clues in your everyday operation:
The app isn’t acting by design.
A Small Business Administration (SBA) venture slated to kick off this summer could bring about substantial changes for all small businesses as the agency establishes a governmentwide mentor-protege program.
SBA officials are putting the finishing touches on rule changes that essentially would clone the agency’s 8(a) Business Development mentor-protege program and offer it to the rest of the nation’s small businesses, said Antonio Doss, district director of the SBA’s Washington Metropolitan Area District Office.
The other day a colleague and I were in getting our morning coffee, and we started talking about AFCEA’s purpose. We don’t work in the same department, so we bring different perspectives to the topic.
I said all associations needed to ask themselves why they exist. I brought up a TED talk I’d seen a while ago about the reasons some businesses succeed and some don’t. The presenter, Simon Sinek, proposes that businesses that succeed ask why they are doing something: “What’s your purpose? What’s your cause? What’s your belief? … Why does your organization exist, and why should anyone care?”
Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment. The survey also revealed that the most important metrics are the least reliable. For example, although 70 percent of respondents said return on investment and total cost of ownership are critical metrics for investment and measurement of a technology’s economic benefits, the same number said it is difficult to calculate these metrics.
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”
Innovation comes in many forms. From gradual evolution or through disruptive processes; as a result of revolutionary thinking or from a confluence of ideas from different entities that share a common goal. Today, we’re seeing more and more innovation blossoming from partnerships among seemingly disparate groups all looking for similar outcomes, whether they concern peace, productivity or profit.
The Department of Veterans Affairs’ (VA) Office of Information and Technology awarded its fourth and final contract for its Transformation Twenty-One Total Technology (T4) contract to help veterans navigate technical access to health care services.
The Department of Veterans Affairs’ Office of Information and Technology awarded a contract for technical management support services for its Health Products Support (HPS), an effort to provide seamless benefits and services to U.S. veterans.
Under the contract, Creative Computing Solutions Incorporated (CCSi) will provide the VA with two teams of subject matter experts to improve processes and manage the system workload and increased operational tempo.
The contract is part of the VA’s Transformation Twenty-One Total Technology (T4) contract vehicle. CCSi won the contract with a one-year base period of performance and the option of extending for two more years.
Research on the state of cybersecurity of the U.S. critical infrastructure companies reveals that 67 percent have experienced at least one security compromise that led to the loss of confidential information or disruption to operations during the past year. In addition, 24 percent of a survey’s respondents said the compromises involved insider attacks or negligent privileged information technology users. Only 6 percent provide cybersecurity training for all employees.
Kent Schneider, AFCEA’s president and chief executive officer, has called the 2013 U.S. Defense Department’s budget woes “the perfect storm.” Budget cuts, travel restrictions and sequestration converged to create an atmosphere of uncertainty and indecision. For the services, this meant a bit of scrambling to determine how reduced funding could have the least impact on national security. For the defense industry, it became a time of reaction and cutbacks, or at least flat budgets.
The inertial navigation system (INS) market size is estimated to be $2.75 billion in 2014 and is projected to grow at a compound annual growth rate of 10.98 percent to reach $4.63 billion by 2019, according to Research and Markets, a Dublin-based market analysis firm. Though North America and Europe have the largest market for INS in terms of commercial and defense aviation, military and naval applications, a lot of INS development programs have been launched in Asia-Pacific and the Middle East.
The late Vice Adm. Arthur K. Cebrowski, USN (Ret.), looks over my shoulder as I work in my home office. His picture graced the May 2003 cover of SIGNAL Magazine, highlighting an article Clarence A. Robinson Jr., wrote based on an interview with the admiral. I was lucky enough to escort SIGNAL’s freelance photographer to take the photo of Adm. Cebrowski when he led the charge for change as the director of the U.S. Defense Department’s Office of Force Transformation. I received a cover photo plaque that hangs in my home office for my effort, though it really wasn’t necessary.
Year-in-review news features are a staple when New Year’s Eve rolls around and are a nice walk down memory lane. But as 2014 dawned, another trend came over the horizon: a plethora of predictions. It could be that social media inspires the urge to share more opinions, or maybe people are just feeling more optimistic about the future with the U.S. budget woes finally being addressed—at least to some degree.
Eight emerging cybersecurity technologies developed by the Department of Energy’s National Laboratories will be featured at the Transition-to-Practice Technology Demonstration Day for Investors, Integrators and IT Companies East event on December 18 in Washington, D.C. The Department of Homeland Security’s Science and Technology Directorate will unveil new capabilities for intrusion detection, removable media protection, software assurance and malware forensics.
Defense sector-specific solutions are driving growth in the cybersecurity market and will continue to do so through 2016. According to a Research and Markets report, the escalating amount of data stored in defense information systems and the increased number of cyberthreats are a major driver of this trend. As a result, companies are focusing on developing security products dedicated specifically to the defense sector.
Industry and government personnel believe that event cancellations and travel restrictions are having a negative impact on innovation and collaboration. According to one survey, the massive decrease in conferences that facilitate intelligence gathering and networking will adversely affect government contractors’ abilities to provide the most up-to-date information, solutions and best practices that government agencies require.
The U.S. Army is conducting a full and open competition to acquire more quantities of the Rifleman Radio and also will soon open competition for purchasing additional Manpack radios. The draft request for proposals (RFP) seeking solutions from all industry partners for the Rifleman is now available, and an informational industry day will be followed by the release of the formal RFP.