Defense Systems
Cybersecurity chief amplifies call for public-private teamwork
White House Cybersecurity Coordinator Howard Schmidt highlighted today at a national symposium efforts in Washington to bolster cyber defense across military and industry.
Defense Systems
DOD considers shielding private networks
The Defense Department is considering deploying the Einstein network protection systems to private-sector networks to protect the nation's critical infrastructure.
Defense Systems
SBA honors computer simulation exec
The small business uses video games-based training to help prepare government agencies and businesses for emergencies and other types of critical training, according to SBA.
Defense Systems
Marines contract for network operations support
Stanley Inc. will provide technical services to the Marine Corps under a three-year, firm-fixed-price contract valued at $22 million.
Defense Systems
IAC announces its new leadership
Industry Advisory Council elects new leadership for the coming year.
Defense Systems
Who is the Cybersecurity Smokey Bear?
A federal cybersecurity official said public service announcement could help make the public more aware of the threat of cyber crimes.
Defense Systems
Army apps competition sparks soldiers' ingenuity
The Apps for Army program is the Army’s first internal application development challenge and one of the first for the federal government.
Defense Systems
ACT/IAC awards innovators for working across borders
The 2010 Intergovernmental Solutions Awards went to states, federal agencies and an academy for their creative work.
Defense Systems
Soldiers need better communications training
Government would not spend millions of dollars on a weapons system and not train its operators. Communications systems must be held to the same standard.
Defense Systems
The road ahead for Cyber Command
With Cyber Command finally getting its first commander — and one with the smarts and expertise of Gen. Keith Alexander — work can begin moving forward in earnest to tackle the tough questions that confront us in the cyber era.
Defense Systems
Protecting our critical infrastructure
The protection of critical infrastructure assets has important ramifications for the military, which relies heavily on that infrastructure, writes Kevin Coleman.
Defense Systems
Revealed: Our picks for the best password strategies
Our readers offer hundreds -- literally -- of good ideas for building and managing strong passwords. Who's idea comes closest to covering all the bases?
Defense Systems
Navy picks three for shipboard local area network support
Three contractors will vie for up to $502 million in shipboard network infrastructure and related engineering work over the next eight years that will support network infrastructure for Navy ships.
Defense Systems
When it comes to government data gathering, public trust is hard to come by
The public doesn't trust government to protect Americans' information, and laws reflect that mind-set, blogger Matthew Weigelt writes.
Defense Systems
Trustworthy battlefield software depends on better testing
The Air Force Office of Scientific Research is taking a new approach to software testing in an effort to significantly reduce the number of errors found in software used in-theater.
Defense Systems
Virtual-reality training plunges soldiers headlong into combat
The Joint Forces Command is testing a helmet-mounted, virtual reality training system designed to prepare troops bound for combat zones to make sound tactical decisions in the heat of battle.
Defense Systems
Navy goes full-ahead with open architecture
The Navy’s Common Processing System will harness commercial products and powerful middleware to keep mission-critical systems online.
Defense Systems
DARPA builds Cyber Range to test security measures
DARPA’s National Cyber Range is automated to ensure that new concepts can be moved rapidly from a test bed to an operational environment.
Defense Systems
DARPA looks for stealthier Internet access
The Defense Advanced Research Projects Agency is seeking technologies to give the military “anonymous Internet communications to bypass techniques that suppress, localize and/or corrupt information.”
Defense Systems