:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PD2JEHCIQZEDXBLRO3PT3WCTUY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PD2JEHCIQZEDXBLRO3PT3WCTUY.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
Opinion
Pentagon makes progress on Zero Trust, but next steps will be critical
Not everyone has the in-house expertise or technology that DISA does, but everyone has the capabilities to pick a place to start and make progress.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TKREDI7AN5D4DFGMCISF34GCJM.jpg)
AI & ML
Democrats and Republicans see role for government in development of AI
The U.S. has a long tradition of government-led technology, including the Internet, GPS and mapping the human genome.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GIRTFCSILNFHVOZX3DZ4CN6MRU.jpg)
UK says Russia behind cyber espionage aimed at undermining democracy
FSB targeted British parliamentarians from at least 2015 to this year and selectively leaked and amplified sensitive information, the Foreign Office said.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PD2TLSZSWFA5XJEUCFOD7MKWHE.jpg)
Unified network promises US Army rapid connectivity, cybersecurity
The unified network and related operations promises global connectivity and fewer isolated pathways to monitor, ultimately promoting cybersecurity.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KDEGBRN6ABGK5GYU6UBLH55IIU.jpg)
Shift5 selected by Army to cyber-harden HIMARS fleet
The U.S. military’s increasingly computerized weapons are at risk of harassment or hijacking, the Government Accountability Office has said.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MC4MNAXR7VFRJARJAOJ5WFEGTA.jpg)
Stalled F-35 upgrades will delay next improvements, Wittman warns
The congressman also worries the latest TR-3 deadline of mid-2024 could slip further: “I want to be positive, but call me skeptical."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PJRXIBZAINB7NHQUVGDAXG6TU4.jpg)
TITAN targeting contract to be awarded soon, Army officials say
The system will connect data-gathering sensors to shooters in the field and support advanced beyond-line-of-sight targeting.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4ZJFSO5XYZEDVLEZJHBSHAIIBM.jpg)
Failure to renew spy program would be ‘devastating,’ FBI chief says
Section 702 of the Foreign Intelligence Surveillance Act allows the U.S. government to collect data without a warrant.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MIQJYOIX5NGO7KESBPR325GRUI.jpg)
Defense officials put technology at center of AUKUS summit
Defense Secretary Lloyd Austin met with his Australian and British counterparts in California to discuss the security pact
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/V5YAHUK5XVDNXL7AJM7XDP4LAY.jpg)
US Navy champions digital weaponry as decider of future fights
"The challenges inherent to the cyber domain are considerable," the Navy secretary wrote, "but failing to mitigate cyber risks is not an option."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KLKSFR64DFER3LI5P25P3QA4YU.jpg)
NATO deepens cyber coalition with Asian partners
Alliance officials work to coordinate their virtual defenses with like-minded governments in Japan and South-Korea.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XL2E7ZZ3VNH4PG566RCHTD2E2Y.jpg)
Opinion
AUKUS can work without gutting US export control laws
The AUKUS-versus-ITAR debate is a false dilemma created by industry and some in Congress, argue analysts Paul Esau and Valerie Lincy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EINOQ3JS4NCVRALXYXLGZV5CYM.jpg)
AI can shore up federal cybersecurity overwhelmed by data, GDIT says
Machines and programs can handle rote tasks, freeing up manpower already spread thin and sought after.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/N4WADPNY2RA67GCVV6YOBITXJ4.jpg)
Opinion
Modular Open System Architecture allows continuous weapon upgrades
MOSA uses standardized connections between major parts of a system that allows easy replacement of major components, subsystems and software.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/QOP3SLUKUBBGZCGARKEI65PZNQ.jpg)
Opinion
The challenge of adding governance as a pillar of cybersecurity
The new framework expands past critical infrastructure and reflects a structure for all organizations, no matter size, industry or region.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2XEKK3OKY5B3NJUDFYAR3N4IGY.jpg)
Opinion
The case for LEO satellite connectivity in $50 billion EIS contract
The contracting vehicle is designed to enable federal agencies to procure mission-critical telecommunications, infrastructure and technology services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/75OWYR6UZBCHXIOCJONTHQYQRY.jpg)
DARPA eyes creation of next-generation semiconductor manufacturing hub
DARPA hopes the program, dubbed Next-Generation Microelectronics Manufacturing, will give the U.S. industrial base a leading technological edge.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HKUDWVFYRNFPXDJFY4QR2UNBBE.jpg)