Search Results for "" Technology ""
Defense Department Aims for Automated Cyber Defense
As the Defense Department continues to forge closer relations with Silicon Valley, its leaders say they need more tools to improve automation of cyber basics, the department’s chief information officer said.
Boeing to Provide Additional Longbow Crew Trainer
Boeing Co., St. Louis, Missouri was awarded a $12,461,218 contract modification for one additional Longbow crew trainer for the Apache helicopter program.
DHS Adds Houston, Chicago to DNDO Program
The Department of Homeland Security added two cities to its Domestic Nuclear Detection Office’s Securing the Cities program, an effort to increase the nation’s capabilities to detect and protect against radiological and nuclear threats. Officials on Monday announced the addition of Houston and Chicago to the program.
The Bottom Line: 5 Ways Technology Has Changed the World
L-3 Wins Cryptography Contract
L-3 National Security Solutions Inc., Reston, Virginia, has been awarded a $13,363,649 cost-plus-incentive-fee and cost- reimbursement delivery order.
Progeny Systems to Assess Multi-Band Sonar System
Progeny Systems Corp., Manassas, Virginia, is being awarded a $44,900,057 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract for engineering
Video Analytics Challenges: Finding the Needles in the Haystack
Processing massive amounts of video and images has become a daunting task for many law enforcement agencies, which are turning to technology for help. The solution sets alone won't solve crime, writes blogger B. Scott Swann, but video analytics will play an increasingly important role in the daily lives of those who protect U.S. citizens.
Touchy Subject: NIST Works to Verify Contactless Fingerprint Technology
The U.S. government wants in on the resurgence of developments in contactless biometric technology, seeing smart applications of such devices in places such as airport security. But before device deployment, officials need to make sure the scanners and sensors actually do what they say they do—safely and accurately.
Attestation and Inception: Deciphering Secure Reality from a Dream
One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?