Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
They have been a separate entity around the Pentagon for less than five years, taking on a variety of complex technical issues for different DoD groups. And their organizational structure is a lot like a Silicon Valley start-up.
Read moreOver the years, the DoD has been at the vanguard of ethical hacking and bug bounty programs, where the good guys find cybersecurity flaws in their systems and let them know.
The latest ransomware attack on Colonial Pipeline has some panicked Americans hoarding gasoline in plastic bags, leaving many to wonder how vulnerable U.S. companies and government entities are.
Alex Rice, the co-founder and chief technology officer at HackerOne, said over the last five years, DoD has identified more than 10,000 vulnerabilities through bug bounty and other similar programs.
The ISS National Lab recently announced a new funding opportunity for in-space production applications.
Everyone knows that Software bills of material (SBOMS) are crucial to cybersecurity. But deciphering these documents has been a challenge for many agencies.
Trade associations connected to federal technology, generally back the latest White House directives on artificial intelligence.
You hear a lot about zero trust controls in government tech circles. Could this approach to cybersecurity be applied to protecting space assets?
The intelligence community’s new OSINT strategy puts a premium on using open-source data, as opposed to highly secretive sources and and methods.
A new group within DoD seeks to track how well new technology makes its way to the troops.
Hanna Kim, who started as deputy director for Login.gov in January, will serve as its director starting in May. She will replace Dan Lopez-Braus.
Chief information security officers, in particular, face an uphill battle with compliance mandates.