Defense Systems

Cybersecurity chief amplifies call for public-private teamwork

White House Cybersecurity Coordinator Howard Schmidt highlighted today at a national symposium efforts in Washington to bolster cyber defense across military and industry.

Defense Systems

DOD considers shielding private networks

The Defense Department is considering deploying the Einstein network protection systems to private-sector networks to protect the nation's critical infrastructure.

Defense Systems

SBA honors computer simulation exec

The small business uses video games-based training to help prepare government agencies and businesses for emergencies and other types of critical training, according to SBA.

Defense Systems

Marines contract for network operations support

Stanley Inc. will provide technical services to the Marine Corps under a three-year, firm-fixed-price contract valued at $22 million.

Defense Systems

IAC announces its new leadership

Industry Advisory Council elects new leadership for the coming year.

Defense Systems

Who is the Cybersecurity Smokey Bear?

A federal cybersecurity official said public service announcement could help make the public more aware of the threat of cyber crimes.

Defense Systems

Army apps competition sparks soldiers' ingenuity

The Apps for Army program is the Army’s first internal application development challenge and one of the first for the federal government.

Defense Systems

ACT/IAC awards innovators for working across borders

The 2010 Intergovernmental Solutions Awards went to states, federal agencies and an academy for their creative work.

Defense Systems

Soldiers need better communications training

Government would not spend millions of dollars on a weapons system and not train its operators. Communications systems must be held to the same standard.

Defense Systems

The road ahead for Cyber Command

With Cyber Command finally getting its first commander — and one with the smarts and expertise of Gen. Keith Alexander — work can begin moving forward in earnest to tackle the tough questions that confront us in the cyber era.

Defense Systems

Protecting our critical infrastructure

The protection of critical infrastructure assets has important ramifications for the military, which relies heavily on that infrastructure, writes Kevin Coleman.

Defense Systems

Revealed: Our picks for the best password strategies

Our readers offer hundreds -- literally -- of good ideas for building and managing strong passwords. Who's idea comes closest to covering all the bases?

Defense Systems

Navy picks three for shipboard local area network support

Three contractors will vie for up to $502 million in shipboard network infrastructure and related engineering work over the next eight years that will support network infrastructure for Navy ships.

Defense Systems

When it comes to government data gathering, public trust is hard to come by

The public doesn't trust government to protect Americans' information, and laws reflect that mind-set, blogger Matthew Weigelt writes.

Defense Systems

Trustworthy battlefield software depends on better testing

The Air Force Office of Scientific Research is taking a new approach to software testing in an effort to significantly reduce the number of errors found in software used in-theater.

Defense Systems

Virtual-reality training plunges soldiers headlong into combat

The Joint Forces Command is testing a helmet-mounted, virtual reality training system designed to prepare troops bound for combat zones to make sound tactical decisions in the heat of battle.

Defense Systems

Navy goes full-ahead with open architecture

The Navy’s Common Processing System will harness commercial products and powerful middleware to keep mission-critical systems online.

Defense Systems

DARPA builds Cyber Range to test security measures

DARPA’s National Cyber Range is automated to ensure that new concepts can be moved rapidly from a test bed to an operational environment.

Defense Systems

DARPA looks for stealthier Internet access

The Defense Advanced Research Projects Agency is seeking technologies to give the military “anonymous Internet communications to bypass techniques that suppress, localize and/or corrupt information.”

Defense Systems

Secure smart phones outpace policy

The Defense Department and civilian leadership in the field have a mobile option for classified e-mail and voice, but DOD leaders haven't formulated a policy for where and when a secure smart phone can be used.