The head of U.S. Cyber Command says cloud computing is part of his plan for staying ahead of the cyber threats that face the Defense Department. “A year from now we should be well on our way to having a hardened architecture proven and in place, which provides a new level of cybersecurity,” said General [...]
Sen. Tom Carper (D-Del) is chairing a hearing on weapons systems cost overruns this afternoon.
The Government Accountability Office said in findings announced to Congress Tuesday that the Nunn-McCurdy amendment, designed to curtail cost growth in Defense programs, has succeeded in bringing an end to only one overly costly military program in the last 14 years.
Ashton Carter, the Defense Department\'s undersecretary for acquisitions, said the Pentagon can buy things quickly when it truly needs to. But when it comes to supporting overseas contingency operations, he said the country needs a dedicated, permanent \"fast lane\" that leapfrogs DoD\'s notoriously slow methods of buying goods and services.
The Pentagon wants servicemen and women to use their own smartphones to develop apps and access the military\'s networks. Senior officials as early as next month will approve the technical standards for devices that run the Apple and Google operating systems.
If you want to do business with the federal government, you have to follow the rules. In theory, those rules are designed to make sure agencies, and in turn, taxpayers, get the best for their…
The National Research Council says that a rise in sea levels of about three feet could jeopardize $100 billion worth of Navy installations.
A new call center, staffed by professionals trained to handle grieving callers, is among the first technology upgrades the Army has made in the aftermath of a management scandal at Arlington National Cemetery last year. Phase two will involve tackling the massive challenge of digitizing the cemetery\'s paper records.
The idea is to treat cyberspace as a domain within DoD and employ active cyber defenses and other new defense approaches.
The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.
The Army and Marine Corps are both in the early phases of deploying logistics accountability systems that will replace a collection of disconnected, stovepiped IT systems and processes that have grown up since the 1960s. Though the systems share the same objective, they were made by different vendors, prompting questions from one member of Congress.
Al Qaida in Iraq has claimed responsibility for last week\'s car bomb attack on an Iraqi army unit that killed at least eight soldiers The bomb targeted an army headquarters in the northern area of Diyala province. 30 others were wounded when it exploded last Monday. Security forces stopped a second attack and defused a car bomb parked at the scene. The attacks in Iraq are a daily occurrence as insurgence continue to attack Iraqi forces knowing that U.S. troops are leaving Iraq totally at the end of this year.
March 23rd, 2011 at 11 AM Criminal enterprises operating globally - so-called \"Transnational Criminal Organizations\" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Susan Lawrence, the Army\'s newly-appointed Chief Information Officer members of the IT and communications industry that the service is focused on creating an end-to-end IT infrastructure, eliminating structures that required soldiers to train and live on one network, and deploy on another.