Reporter: Cyber Security/IT/Military
Defense Daily
Ph: 240-477-2677
Matthew Beinart
Articles By Matthew
-
UncategorizedArmy Seeking Partnerships To Grow AI Network Protection Capabilities
Army leadership is set on shifting its network protection apparatus to leverage automated artificial intelligence (AI) capabilities as it looks to free up its growing cyber branch service to develop […]
-
UncategorizedCBP Awards CACI $35M for Support AMOSS
CACI International [CACI] has received a four-year $34.5 million task order from Customs and Border Protection (CBP) to continue providing technology updates and operations and maintenance to the agency’s Air […]
-
CyberDoD IT Officials Urge Senior Leadership To Set Automation, Application Cloud Migration Priorities
Department of Defense information technology (IT) officials are urging senior leadership to prioritize acquisition efforts needed to speed up the integration of network automation capabilities and the migration of critical […]
-
CyberAir Force Focusing IT Acquisition On Agile Software Development, Open Mission Systems
The Air Force’s information technology acquisition director is using her experience as the former vice director of the Defense Information Systems Agency to alter the Air Force’s approach to meet […]
-
CyberDHS Still Pushing For Cyber Protection Office To Improve Information Sharing
In the wake of the recent massive Equifax [EFX] data breach, the Department of Homeland Security hopes to establish a new cyber security and infrastructure protection office to improve information […]
-
CyberFinal Version of NDAA Directs White House, DoD To Update Cyber Strategies
The final version of the defense authorization bill for fiscal year 2018 calls on the White House to develop a national cyber warfare policy and directs the Department of Defense […]
-
CyberWH Cyber Coordinator: National Cyber Strategy To Be Released Soon
The White House’s cyber security coordinator is hoping the imminent release of the administration’s national cyber strategy will allow the federal government to take a more direct approach in rapidly […]
-
CyberFBI Senior Analyst: More Cyber Attacks Now Originate from ‘Legitimate Credentials;’ Blend in with Normal Network Behavior
Recent trends in malicious cybersecurity activity show that hackers are becoming much more adept at breaching networks using acquired “legitimate” credentials (such as outdated test log-in accounts to VPNs) and […]
-
CyberCyber Industry Panel: Social Practices Factor Into Potential Breaches
Speakers at the 2017 CyberSat Summit emphasized that improving technology capabilities is only a piece of the larger cybersecurity puzzle. During a panel assessing the evolving threat landscape in aerospace, […]