:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GIRTFCSILNFHVOZX3DZ4CN6MRU.jpg)
UK says Russia behind cyber espionage aimed at undermining democracy
FSB targeted British parliamentarians from at least 2015 to this year and selectively leaked and amplified sensitive information, the Foreign Office said.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/55VHSEKJ25FPRLP33VDHGU6YJI.jpg)
Battlefield Tech
Eight contract opportunities to watch in FY24
There are several major U.S. defense competitions expected in fiscal 2024, with just these eight estimated to be worth a total of $61.9 billion.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4ZJFSO5XYZEDVLEZJHBSHAIIBM.jpg)
Failure to renew spy program would be ‘devastating,’ FBI chief says
Section 702 of the Foreign Intelligence Surveillance Act allows the U.S. government to collect data without a warrant.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/QOP3SLUKUBBGZCGARKEI65PZNQ.jpg)
Opinion
The challenge of adding governance as a pillar of cybersecurity
The new framework expands past critical infrastructure and reflects a structure for all organizations, no matter size, industry or region.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2XEKK3OKY5B3NJUDFYAR3N4IGY.jpg)
Opinion
The case for LEO satellite connectivity in $50 billion EIS contract
The contracting vehicle is designed to enable federal agencies to procure mission-critical telecommunications, infrastructure and technology services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YCG4LXLO2NBWZBMCM33HOUVR54.jpg)
Opinion
5 steps to better artificial intelligence procurement
Over the past 75 years or so, we have come simply to accept that policy lags technology.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HKUDWVFYRNFPXDJFY4QR2UNBBE.jpg)
Pentagon seeks to rapidly build up information-warfare force
Emerging technologies play a critical role in both waging and foiling influence campaigns, according to the Defense Department's strategy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/RLFO6EFBOZEBTOFAOJIUTDJMOE.jpg)
Pentagon AI boss seeks ‘justified confidence’ to take tech into battle
Not a soldier but a data scientist, Martell headed machine-learning at companies including LinkedIn, Dropbox and Lyft before taking the job last year.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VVXGCSWYQJB4PNB5UJWHDJS7ZE.jpg)
Opinion
Changing video bit rate on the fly can boost the effectivness of ISR
The video-based intelligence provided by ISR platforms is critical to the situational awareness and effective decision-making needed for mission success.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MEAU4AMNSRENFJH6YR5RND6DH4.jpg)
Opinion
Unmanned systems are only as capable as their networks
The current discussion on the use of drones and robotic unmanned systems tends to overlook the pressing challenges of their connectivity.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/NL4QUYUZDBBL3DYW2QOCOQK2EE.jpg)
Navigating the Pentagon’s social media rules amid the Israel-Hamas war
While OPSEC remains a priority, the lines about what service members can and cannot post have become more blurred.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TG6WZ7O5MRDEZFRPSSBQP55KLA.jpg)
Navy creates three new IT submarine ratings to promote specialization
The sailors will specialize in communications, network security and electronic warfare.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/K72JVJM2ZZHOFJXDDKPBBJIUCM.jpg)
White House radio spectrum access plan may benefit internet, drones
As much as 2,786 megahertz of spectrum may be repurposed for wireless broadband, drones and satellites.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
Opinion
For the federal government, Zero Trust is just the beginning
Zero Trust has been top-of-mind for the Department of Defense for some time now, as evidenced by the aggressive strategy unveiled by the agency.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FV7VONEIEVBMDEYH5U7L53UPGE.jpg)
Opinion
How agencies can bolster cyber infiltration, ‘exfiltration’ defenses
Exfiltration can manifest itself in an accidental or intentional disclosure of internal data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5H273YSWZBFKHJ5MBMOPKEDS5I.jpg)
Opinion
Following the roadmap to open-source software security
It’s up to oversight bodies such as CISA, government leaders and industry partners to set baseline expectations for OSS use and ensure security.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XBUIO3AFBNE7NFJKLRZ4ZSMBU4.jpg)
Opinion
Zero hour for Zero Trust: How data tagging can speed implementation
Currently, agencies take their own unique approaches to the data discovery process, the authors say.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5F2AOZXNMRGY7FYJV5IF7C2UTI.jpg)