DEFENSE - ALL ARTICLES

Results 81-90 of 12663
Mariposa Port of Entry is shown in 2011

The U.S. Is Making Its Border Stations More Welcoming

Despite Republican appeals for a wall between the U.S. and Mexico, America is investing in more secure, welcoming facilities along its borders.

The DroneDefender from Battelle can interrupt a drone's control link at 400 meters.

Pentagon Urgently Pushing Anti-Drone Tech to ISIS Fight

From mast-mounted radar to drone-jamming guns, the U.S. military’s anti-IED office is rushing to keep up.

Authority to determine classification levels was one of the many issues raised by Hillary Clinton's email controversy.

State Department Has a Ways to Go to Achieve Proper Classification of Documents

Inspector general faults training, outdated lists of officials with authority to determine secrecy levels.

TRICARE Lowers Mental Health Care Co-Pays, Expands Treatment Options

This month retirees and dependents started paying $13 less per visit for outpatient care and substance abuse treatment.

An F-15E Strike Eagle takes off from Los Llanos Air Base, Spain.

US Allows Qatar to Buy F-15s — and Seals a $19B Sale of Jetliners

Officials deny linking the military and commercial deals, but insiders say otherwise.

The guided missile destroyer USS Barry deploys to sea from Naval Station Norfolk ahead of Hurricane Sandy in 2012.

A Military View on Climate Change: It’s Eroding Our National Security

Politicians are still debating whether climate change is real, but military planners call it a serious threat. A retired rear admiral explains how climate change affects U.S. national security.

An Indian paramilitary soldier runs for cover amid tear gas smoke as Kashmiri protesters throw stones and bricks at him during a protest in Srinagar, Indian controlled Kashmir on Friday.

Pakistan to Obama: Kashmir Will Hurt Our Ability to Help Fight the Taliban

Pakistan wants President Obama’s help in the Kashmir conflict with India, Pakistan’s senate defense chairman will tell the National Security Council on Friday.

The U.S. Army has two rucksack-portable drones, including the hand-launched Puma shown here. The service is looking to procure a smaller, shorter range UAV as soon as next year.

The Army’s Next Drone May Fit in a Soldier’s Pocket

The service could start buying palm-sized UAVs to complement its Pumas and Ravens as soon as 2018, according to one official.

The Russian Hack of the DNC

U.S. intelligence officials said they are “confident” only senior Moscow officials could have authorized it.

Former National Security Agency contractor Edward Snowden, center speaks via video conference to people in the Johns Hopkins University auditorium, in Baltimore in February.

Data-Theft Arrest Shows that Insider Threat Remains Despite Post-Snowden Security Improvements

The case of the NSA contractor arrested this week shows that the intelligence community has much further to go in stopping insider threats.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.