AUTHOR ARCHIVES

Results 1-10 of 432

Air Force Casts a Wide Net For Cyber Warfare Tools

May 20, 2013 FROM NEXTGOV arrow The Air Force is scanning the market for “cyber warfare systems” tools, in an acknowledgment of the need to open up the opaque and inaccessible space to new players, documents show. The acquisition unit for Air Force cyber operations known as the Network Warfare Systems Branch, posted a request for...

General Dynamics Picked to Patch Network Attack System

April 29, 2013 FROM NEXTGOV arrow General Dynamics is rolling out upgrades and logistics support for a classified Air Force network attack system, federal databases indicate. General Dynamics, the defense firm tapped for the contract from August 2012 to February 2013, is expected to continue servicing the system through the year’s end, as part of a...

Congressional commission to look closer at China cloud computing

January 22, 2013 FROM NEXTGOV arrow The U.S.-China Economic and Security Review Commission, an advisory group to Congress, is putting more scrutiny on national security threats posed to American businesses by Chinese cloud computing companies. The group, tasked by Congress to monitor the risks of trade with China, is commissioning a report on the ties of...

Can you predict the future by reading Twitter? The Pentagon thinks maybe.

January 14, 2013 FROM NEXTGOV arrow The Defense Department wants new computer tools to analyze mounds of unstructured text, blogs and tweets as part of a coordinated push to help military analysts predict the future and make decisions faster. The search is part of the Office of Naval Research’s “Data to Decisions” program, a series of...

Navy denies that Iran captured intelligence drone

December 4, 2012 FROM NEXTGOV arrow The U.S. military refuted claims by Iran that it captured an intelligence drone being flown over the Persian Gulf, Reuters reports. Iranian state television broadcast images of a ScanEagle being inspected by Rear Adm. Ali Fadavi, the commander of the Revolutionary Guards Corps naval forces, reports said. The drone, a...

Pentagon directive targets fake parts, vulnerabilities in arms systems

December 3, 2012 FROM NEXTGOV arrow A new Pentagon directive is calling for new safeguards against fake parts and software vulnerabilities in arms and information systems. The mandate, which took effect Nov. 5, is likely to bring new momentum to funding of technology to protect military supply chains. Signed by Teresa Takai, defense chief information officer,...

Raytheon nabs $422 million precision-guided munitions contract

November 30, 2012 FROM NEXTGOV arrow Raytheon Co. nabbed a $422 million precision-guided munitions contract, it announced. The defense contract is for its Paveway GPS and laser-guided bomb technology, which are deployed by 43 customers. The company did not reveal who it closed the deal with, saying only it was a “direct commercial sale from an...

Pentagon, Lockheed, move closer on next F-35 contract

November 29, 2012 FROM NEXTGOV arrow Lockheed Martin and the Defense Department are nearing consensus on a long-delayed contract for a fifth batch of F-35 fighter jets, Reuters reports. Defense Undersecretary Frank Kendall told Reuters the Pentagon was “getting close” to an agreement. The $396 billion F-35 program is the Pentagon's largest weapons program. Defense and...

Pentagon exempts cyber weapons from collateral damage directive

November 28, 2012 FROM NEXTGOV arrow The Defense Department does not require developers of computer systems that launch cyber operations to implement the same safeguards required of traditional arms makers to prevent collateral damage. A Pentagon mandate that autonomous weapons be built and tested so humans won’t lose control over them doesn’t apply to cyber weapons,...

Video: Experimental X-47B drone will undergo testing at sea

November 27, 2012 FROM NEXTGOV arrow An experimental drone will undergo tests aboard the airship carrier USS Harry S. Truman (CVN 75), the first modern aircraft carrier to host test operations for an unmanned aircraft, the Navy said. The test will demonstrate how the X-47B drone, which has a 62-foot wingspan, can be integrated into carrier...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.