Ray Falcione has joined OmniSci, San Francisco, as vice president of U.S. Federal Business.
James Clapper has joined StellarPeak, Reston, Virginia as senior advisor.
AbleVets, Chantilly, Virginia, has appointed Paul Bradley as vice president of technology.
Zain Ahmed has been promoted to vice president and general manager of CenturyLink's federal civilian and law enforcement practice, Tysons Corner, Virginia.
David Van Wie has been named head of the air and missile defense sector for Johns Hopkins Applied Physics Laboratory, Laurel, Maryland.
Christopher Sharpley has been named managing director of the federal practice at Next Phase Solutions, Oviedo, Florida.
Samantha Segall has joined CLEAR as senior director of government relations in Washington, D.C.
U.S. Army leaders agree the way forward is through a fundamental cultural shift—a shift that needs to be inclusive of both strategic and tactical sides for a more holistic strategy based on mission objectives and operational needs.
Kelly Nelson has been named vice president of business operations at the Herndon, Virginia-based ViON.
Cadence Aerospace, Anaheim, California, has named Kevin Martin as chief information officer.
Maxar Technologies, Westminster, Colorado, has named Daniel Jablonsky president and CEO.
Shelly Gabersek has joined BAE Systems as strategic capture director for the British defense contractor's U.S. subsidiary.
Carrie Charles has been appointed CEO for Broadstaff of Laurel, Maryland.
The cloud strategy document released this week by the U.S. Defense Department is drawing mixed reactions from industry and military officials. Experts welcome the strategy as an important step toward modernizing the department’s infrastructure but also express some concerns and note that many questions remain.
Department of Homeland Security (DHS) Chief Procurement Officer Soraya Correa announced this week that DHS will follow a new strategy for obtaining information technology services. Rather than pursue a re-competition of the Enterprise Acquisition Gateway for Leading-Edge Solutions (EAGLE) II, the department will offer an array of options for industry, including greater opportunity for small businesses, under EAGLE Next Generation.
The U.S. defense industrial supply chain is vast, complex and vulnerable. Organic components, large-scale integrators, myriad commercial service providers, and tens of thousands of private companies sustain the Defense Department. According to the SANS Institute, the percentage of cyber breaches that originate in the supply chain could be as high as 80 percent.
The move away from technologies meant for a static battlefield environment continues for the U.S. Marine Corps, as the service fields technologies needed for operating in austere environments.
Leaders want ruggedized and resilient technologies that are low in size, weight and power for soldiers on the move. The technology gaps to fill come across all aspects of command, control, communications and computing, or C4. Marine Corps leaders identified the service’s top technological needs during the Modern Day Marine event September 25-27 at the Marine Corps Quantico base.
Leveraging artificial intelligence and machine learning is a hot topic for the Defense Intelligence Agency (DIA), and the agency isn’t letting conventional thinking stand in the way of finding innovative ideas. The upcoming Director’s 3rd Quarterly Industry Day is just one example. From planning to execution, the two-day event is designed to find new capabilities and business processes from the private sector and academia.
Cyber is one domain that could benefit from lessons taught in kindergarten: learn to share and build trust.
Those two could provide for a strong foundation toward securing the cyberspace, according to a panel of experts who spoke Tuesday at AFCEA International’s Defensive Cyber Operations Symposium (DCOS), taking place this week in Baltimore. The event runs June 13-15.
Efforts to increasingly digitize networks that run the nation’s critical infrastructure enterprises also are boosting attack surfaces and vulnerabilities in an enduring cybersecurity contest in which hackers target those weaknesses with an elevated furor, experts admonished during a panel discussion on the issue.