C4I
-
UncategorizedDespite High Returns, Federal Agencies Get Average Grades For Mobile Progress
Federal IT managers give their agencies average grades for progress made on mobility and telework, despite a law, a White House strategy and high returns to investment encouraging them to […]
-
UncategorizedHouse Appropriators Make Small Cuts To DHS’ Cyber Budget, Remain Critical Of Info Sharing
The House Appropriations Committee’s markup of the Homeland Security FY’15 spending bill made only small cuts to requested cyber funds, but the appropriators remained critical of a major threat detection […]
-
UncategorizedNSA Accredits Seven Companies In National Cyber Security Program
The National Security Agency (NSA) on June 6 said it has accredited seven companies under its National Security Cyber Assistance Program (NSCAP), showing the companies have consistently demonstrated cyber incident […]
-
UncategorizedLockheed Martin Awarded Contract For Ship Missile Launching System
The Navy has awarded Lockheed Martin [LMT] a contract that could reach a value of $182 million for work on the Navy’s MK 41 vertical launch system for shooting missiles and other […]
-
UncategorizedFederal Cyber Security Leaders Want Faster Rollout Of Threat Monitoring Sensors, Study Says
A majority of federal cyber security leaders surveyed believe that a new cyber threat monitoring program being managed by the Department of Homeland Security (DHS) for federal civilian networks is […]
-
UncategorizedGAO Finds Army Is Using Competition In Select Network Programs
The Army is incorporating competition in various ways for most of the nine tactical networking acquisition programs the Government Accountability Office (GAO) scrutinized, though recommendations were not made in the […]
-
UncategorizedDHS At Risk Of ‘Completely Wasting The Money’ On Cyber Threat Mitigation Program, Expert Says
The Department of Homeland Security (DHS) risks losing the initial investment in its cyber network diagnostics program if it does not make the data more actionable, an expert said May […]
-
UncategorizedDefensible Networks, C2 Among CYBERCOM Chief’s Plans To Operationalize Cyberwar
As the military begins to outline operational concepts while the threat of cyber conflict continues to grow, the new Cyber Command chief said defensible networks, command and control (C2), common […]
-
UncategorizedLegacy Cybersecurity Products Won’t Protect 97 Percent Of Organizations That Use Them, Report Finds
A report from FireEye [FEYE] and its subsidiary Mandiant has found that 97 percent of organizations using legacy cybersecurity products are not receiving any protection from their investments. Sandboxing, signature-based protections, application blacklists, legacy […]
-
UncategorizedNorthrop Grumman Develops Link Across 5th, 4th Generation Fighters
Northrop Grumman [NOC] has demonstrated a network that allows fifth-generation fighters jets such as the F-22 and F-35 to communicate and share data with earlier generation aircraft, the company said. […]