Industry

April 16, 2019
 

Ray Falcione has joined OmniSci, San Francisco, as vice president of U.S. Federal Business.

April 4, 2019
 

James Clapper has joined StellarPeak, Reston, Virginia as senior advisor.

April 4, 2019
 

AbleVets, Chantilly, Virginia, has appointed Paul Bradley as vice president of technology.

April 4, 2019
 

Zain Ahmed has been promoted to vice president and general manager of CenturyLink's federal civilian and law enforcement practice, Tysons Corner, Virginia.

March 28, 2019
 

David Van Wie has been named head of the air and missile defense sector for Johns Hopkins Applied Physics Laboratory, Laurel, Maryland.

March 28, 2019
 

Christopher Sharpley has been named managing director of the federal practice at Next Phase Solutions, Oviedo, Florida.

March 28, 2019
 

Samantha Segall has joined CLEAR as senior director of government relations in Washington, D.C.

March 27, 2019
By Kaitlyn Cotter
Brig. Gen. Jennifer Buckner, USA, director of cyber, electronic warfare, and information operations, Department of the Army G-3/5/7, addresses modernization effort during a Women in Leadership Panel at AFCEA Belvoir Industry Days. Credit: Michael Carpenter

U.S. Army leaders agree the way forward is through a fundamental cultural shift—a shift that needs to be inclusive of both strategic and tactical sides for a more holistic strategy based on mission objectives and operational needs.

March 26, 2019
 

Kelly Nelson has been named vice president of business operations at the Herndon, Virginia-based ViON.

March 26, 2019
 

Cadence Aerospace, Anaheim, California, has named Kevin Martin as chief information officer.

March 26, 2019
 

Maxar Technologies, Westminster, Colorado, has named Daniel Jablonsky president and CEO.

March 26, 2019
 

Shelly Gabersek has joined BAE Systems as strategic capture director for the British defense contractor's U.S. subsidiary.

March 21, 2019
 

Carrie Charles has been appointed CEO for Broadstaff of Laurel, Maryland.

February 6, 2019
By George I. Seffers
Industry and military officials see both silver linings and gray skies in the Pentagon's cloud computing strategy. Credit: Ivan Cholakov and jannoon0281/Shutterstock, edited by Chris D'Elia

The cloud strategy document released this week by the U.S. Defense Department is drawing mixed reactions from industry and military officials. Experts welcome the strategy as an important step toward modernizing the department’s infrastructure but also express some concerns and note that many questions remain.

December 19, 2018
 
Everett Kaneshige, chief strategy officer for broadband and telecommunications for the State of Hawaii (l) and Tom Lawless, U.S. Department of Homeland Security (DHS) region IX coordinator, test satellite connectivity in remote areas affected by the Kilauea volcanic eruption. DHS has announced a new approach to information technology modernization, which opens new opportunities for industry, including small businesses. Credit: Grace Simoneau/FEMA

Department of Homeland Security (DHS) Chief Procurement Officer Soraya Correa announced this week that DHS will follow a new strategy for obtaining information technology services. Rather than pursue a re-competition of the Enterprise Acquisition Gateway for Leading-Edge Solutions (EAGLE) II, the department will offer an array of options for industry, including greater opportunity for small businesses, under EAGLE Next Generation.

November 30, 2018
By Sean Berg
Small contractors remain cyber's weak link in the defense industrial chain. Credit: TheDigitalArtist/Pixabay

The U.S. defense industrial supply chain is vast, complex and vulnerable. Organic components, large-scale integrators, myriad commercial service providers, and tens of thousands of private companies sustain the Defense Department. According to the SANS Institute, the percentage of cyber breaches that originate in the supply chain could be as high as 80 percent.

October 9, 2018
Kimberly Underwood
James Geurts, assistant secretary of the Navy, speaks at the recent Modern Day Marine event in Quantico, Virginia.

The move away from technologies meant for a static battlefield environment continues for the U.S. Marine Corps, as the service fields technologies needed for operating in austere environments.

Leaders want ruggedized and resilient technologies that are low in size, weight and power for soldiers on the move. The technology gaps to fill come across all aspects of command, control, communications and computing, or C4. Marine Corps leaders identified the service’s top technological needs during the Modern Day Marine event September 25-27 at the Marine Corps Quantico base.

July 7, 2017
By Maryann Lawlor
Robert Dixon, special adviser for innovation, DIA, announces the agency’s third industry day series set for August 2-3 at Joint Base Anacostia-Bolling, Washington, D.C.

Leveraging artificial intelligence and machine learning is a hot topic for the Defense Intelligence Agency (DIA), and the agency isn’t letting conventional thinking stand in the way of finding innovative ideas. The upcoming Director’s 3rd Quarterly Industry Day is just one example. From planning to execution, the two-day event is designed to find new capabilities and business processes from the private sector and academia.

June 13, 2017
By Sandra Jontz
Panelists discuss cybersecurity at AFCEA's Defensive Cyber Operations Symposium.

Cyber is one domain that could benefit from lessons taught in kindergarten: learn to share and build trust.

Those two could provide for a strong foundation toward securing the cyberspace, according to a panel of experts who spoke Tuesday at AFCEA International’s Defensive Cyber Operations Symposium (DCOS), taking place this week in Baltimore. The event runs June 13-15. 

October 28, 2016
By Sandra Jontz
Better cybersecurity begins with everyone getting better at assessing risk, said Bob Kolasky (c), deputy assistant secretary for infrastructure protection at the Department of Homeland Security.

Efforts to increasingly digitize networks that run the nation’s critical infrastructure enterprises also are boosting attack surfaces and vulnerabilities in an enduring cybersecurity contest in which hackers target those weaknesses with an elevated furor, experts admonished during a panel discussion on the issue.

Pages