AUTHOR ARCHIVES

Results 21-30 of 432

Boeing reshuffles defense executives as business shrinks

November 9, 2012 FROM NEXTGOV arrow Boeing is disbanding its Missiles and Unmanned Airborne Systems division and distributing its duties among other units as demand slows and worldwide defense spending tightens, the Associated Press reports. The missiles and unmanned planes unit had dedicated finance, human resources and legal staff, according to the AP. Missiles will now...

BlackBerry 10 gets FIPS security certification

November 8, 2012 FROM NEXTGOV arrow Research In Motion announced that the yet-to-be-launched BlackBerry 10 platform is FIPS 140-2 certified, a move that could remove barriers to entry for use of the company’s smartphones in government agencies concerned about data breaches. FIPS 140 is issued by the National Institute of Standards and Technology, which helps to...

U.K. intel arm establishes cyber response squad

November 7, 2012 FROM NEXTGOV arrow The Government Communications Headquarters, Britain’s intelligence agency, has picked four security companies to help U.K. organizations respond to breaches and computer attacks. BAE Systems Detica, Cassidian, Context IS and U.S.-based Mandiant were chosen as part of a pilot scheme aimed at protecting the public sector and critical infrastructure, BAE announced....

Raytheon nabs Navy ship contract

November 6, 2012 FROM NEXTGOV arrow Raytheon was awarded a $22.5 million Navy contract for the Ship Self-Defense System, an anti-ship cruise missile technology on carriers and amphibious ships, the defense contractor announced. The system integrates sensors and weapon systems to provide a response to missile threats. Raytheon, under the contract, will continue developing and testing...

Japan plans development of missile-tracking UAVs

November 5, 2012 FROM NEXTGOV arrow Japan’s Defense Ministry plans to develop unmanned aerial vehicles that detect ballistic missiles sooner than existing systems, Japan’s Yomiuri Shimbun reports. Japan relies on data from U.S. forces' early-warning satellites as well as ground radar and Aegis destroyers to detect missiles, but the technology only allows it to pick up...

Pentagon zooms in on smart camera tech for the battlefield

November 5, 2012 FROM NEXTGOV arrow The Pentagon’s venture capital arm is on the lookout for tiny and light multiband cameras to bring enemy threats into sharper focus for ground soldiers. The Defense Advanced Research Projects Agency has launched a funding initiative called Pixel Network for Dynamic Visualization to back the development of small, portable camera...

Pentagon taps BAE to make battlefield computing more efficient

November 1, 2012 FROM NEXTGOV arrow The Pentagon’s venture capital wing awarded $10.9 million to BAE Systems to develop more efficient computing technology that could be used in weapons systems, contract databases indicate. The money came out of a Defense Advanced Research Projects Agency funding initiative called Power Efficiency Revolution For Embedded Computing Technologies, which aims...

Tech Roundup

November 1, 2012 Rebooting Federal IT Rep. Darrell Issa, R-Calif., is floating proposed legislation that would drastically reform the way federal technology is purchased and grant agency chief information officers authority over their information technology budgets—authority currently held only by the Veterans Affairs Department CIO. If approved, the draft legislation would be the...

Pentagon withholds $47 million from Lockheed on F-35

October 31, 2012 FROM NEXTGOV arrow The Pentagon is withholding $46.5 million from Lockheed Martin because of ongoing deficiencies with a system used to track costs and schedules for the F-35 fighter, Bloomberg reports. The F-35 has been criticized for delays and growing costs. Program costs are at an estimated $395.7 billion for eventual production of...

Most U.S. drones openly broadcast secret video feeds

October 30, 2012 FROM NEXTGOV arrow The U.S. military has failed to secure the transmissions of over half of its fleet of Predator and Reaper drones, four years after discovering that militants were tapping its drone video feeds, Wired’s DangerRoom reports. U.S. military personnel in 2008 apprehended a Shiite militant whose laptop contained files of intercepted...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.