AUTHOR ARCHIVES

Results 21-30 of 432

Boeing reshuffles defense executives as business shrinks

November 9, 2012 FROM NEXTGOV arrow Boeing is disbanding its Missiles and Unmanned Airborne Systems division and distributing its duties among other units as demand slows and worldwide defense spending tightens, the Associated Press reports. The missiles and unmanned planes unit had dedicated finance, human resources and legal staff, according to the AP. Missiles will now...

BlackBerry 10 gets FIPS security certification

November 8, 2012 FROM NEXTGOV arrow Research In Motion announced that the yet-to-be-launched BlackBerry 10 platform is FIPS 140-2 certified, a move that could remove barriers to entry for use of the company’s smartphones in government agencies concerned about data breaches. FIPS 140 is issued by the National Institute of Standards and Technology, which helps to...

U.K. intel arm establishes cyber response squad

November 7, 2012 FROM NEXTGOV arrow The Government Communications Headquarters, Britain’s intelligence agency, has picked four security companies to help U.K. organizations respond to breaches and computer attacks. BAE Systems Detica, Cassidian, Context IS and U.S.-based Mandiant were chosen as part of a pilot scheme aimed at protecting the public sector and critical infrastructure, BAE announced....

Raytheon nabs Navy ship contract

November 6, 2012 FROM NEXTGOV arrow Raytheon was awarded a $22.5 million Navy contract for the Ship Self-Defense System, an anti-ship cruise missile technology on carriers and amphibious ships, the defense contractor announced. The system integrates sensors and weapon systems to provide a response to missile threats. Raytheon, under the contract, will continue developing and testing...

Japan plans development of missile-tracking UAVs

November 5, 2012 FROM NEXTGOV arrow Japan’s Defense Ministry plans to develop unmanned aerial vehicles that detect ballistic missiles sooner than existing systems, Japan’s Yomiuri Shimbun reports. Japan relies on data from U.S. forces' early-warning satellites as well as ground radar and Aegis destroyers to detect missiles, but the technology only allows it to pick up...

Pentagon zooms in on smart camera tech for the battlefield

November 5, 2012 FROM NEXTGOV arrow The Pentagon’s venture capital arm is on the lookout for tiny and light multiband cameras to bring enemy threats into sharper focus for ground soldiers. The Defense Advanced Research Projects Agency has launched a funding initiative called Pixel Network for Dynamic Visualization to back the development of small, portable camera...

Pentagon taps BAE to make battlefield computing more efficient

November 1, 2012 FROM NEXTGOV arrow The Pentagon’s venture capital wing awarded $10.9 million to BAE Systems to develop more efficient computing technology that could be used in weapons systems, contract databases indicate. The money came out of a Defense Advanced Research Projects Agency funding initiative called Power Efficiency Revolution For Embedded Computing Technologies, which aims...

Tech Roundup

November 1, 2012 Rebooting Federal IT Rep. Darrell Issa, R-Calif., is floating proposed legislation that would drastically reform the way federal technology is purchased and grant agency chief information officers authority over their information technology budgets—authority currently held only by the Veterans Affairs Department CIO. If approved, the draft legislation would be the...

Pentagon withholds $47 million from Lockheed on F-35

October 31, 2012 FROM NEXTGOV arrow The Pentagon is withholding $46.5 million from Lockheed Martin because of ongoing deficiencies with a system used to track costs and schedules for the F-35 fighter, Bloomberg reports. The F-35 has been criticized for delays and growing costs. Program costs are at an estimated $395.7 billion for eventual production of...

Most U.S. drones openly broadcast secret video feeds

October 30, 2012 FROM NEXTGOV arrow The U.S. military has failed to secure the transmissions of over half of its fleet of Predator and Reaper drones, four years after discovering that militants were tapping its drone video feeds, Wired’s DangerRoom reports. U.S. military personnel in 2008 apprehended a Shiite militant whose laptop contained files of intercepted...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.