Uncategorized
-
UncategorizedSASC-Approved Bill Gets DoD Out of Russian Rocket Engine Business
The Senate Armed Services Committee- (SASC) approved fiscal year 2015 authorization bill text bars the defense secretary from entering into a new contract, or renewing a current contract, for space […]
-
UncategorizedBriefing
Aerient, LLC has received a six-month, $1.6 million task order from the Department of Homeland Security’s Office of Cyber Security & Communications to provide operation and maintenance support for critical […]
-
BudgetSASC Cuts Most Funding For Next-Gen JSTARS, Small Diameter Bomb; Trims Reaper Funding
The Senate Armed Services Committee slashed funding for the Air Force’s E-8 Joint Surveillance Target Attack Radar System follow-on program, opting instead to investigate cheaper options. It also took out […]
-
ArmyATK Garners More Than $100 Million For Ammunition Production And Development
ATK [ATK] Wednesday said it received several domestic contracts totaling more than $112 million for medium- and large-caliber ammunition production and development for ammunition to arm aircraft such as the […]
-
UncategorizedFederal Cyber Security Leaders Want Faster Rollout Of Threat Monitoring Sensors, Study Says
A majority of federal cyber security leaders surveyed believe that a new cyber threat monitoring program being managed by the Department of Homeland Security (DHS) for federal civilian networks is […]
-
UncategorizedGAO Finds Army Is Using Competition In Select Network Programs
The Army is incorporating competition in various ways for most of the nine tactical networking acquisition programs the Government Accountability Office (GAO) scrutinized, though recommendations were not made in the […]
-
UncategorizedDHS At Risk Of ‘Completely Wasting The Money’ On Cyber Threat Mitigation Program, Expert Says
The Department of Homeland Security (DHS) risks losing the initial investment in its cyber network diagnostics program if it does not make the data more actionable, an expert said May […]
-
UncategorizedDefensible Networks, C2 Among CYBERCOM Chief’s Plans To Operationalize Cyberwar
As the military begins to outline operational concepts while the threat of cyber conflict continues to grow, the new Cyber Command chief said defensible networks, command and control (C2), common […]
-
UncategorizedLegacy Cybersecurity Products Won’t Protect 97 Percent Of Organizations That Use Them, Report Finds
A report from FireEye [FEYE] and its subsidiary Mandiant has found that 97 percent of organizations using legacy cybersecurity products are not receiving any protection from their investments. Sandboxing, signature-based protections, application blacklists, legacy […]
-
UncategorizedNorthrop Grumman Develops Link Across 5th, 4th Generation Fighters
Northrop Grumman [NOC] has demonstrated a network that allows fifth-generation fighters jets such as the F-22 and F-35 to communicate and share data with earlier generation aircraft, the company said. […]