The Cybersecurity and Infrastructure Security Agency and the National Security Agency have issued a document outlining the security considerations when implementing a 5G open radio access network infrastructure. Some of the security
MoreThe Defense Information Systems Agency is soliciting information on potential industry sources of technical and engineering services in support of the Defense Enterprise Office Solution program. DISA wants information on potential vendors
MoreThe Center for the Advancement of Science in Space will continue to manage an International Space Station segment that operates as a U.S. national laboratory through 2027 under an extended cooperative agreement
MoreVerizon has teamed with the University of South Carolina to create a 5G-powered facility for experimentation in a variety of fields that serve the public good. Located in the McNair Center in
MoreIn order to counteract a spike in costly scam activity over the last several years, the U.S. Federal Trade Commission has put forward a potential new rule that would allow for financial justice
MoreThe U.S. Department of Defense has tapped Verizon to install and maintain a private 5G network located in an aircraft maintenance hangar at a joint military base in Hawaii. The Tranche 2 contract
MoreNational security technology developer ManTech International has finalized its $4.2 billion all-cash acquisition by investment firm Carlyle, which was first announced in May. Now that the transaction is complete, ManTech will be a private
MoreSenate Homeland Security and Governmental Affairs Committee members heard testimony from a TikTok executive on the mobile video sharing platform’s connection to China and access to data on U.S. users of the
MoreNina Chen, a chemical engineer with experience working in the financial services sector, has been appointed to serve as the chief climate risk officer of the Office of the Comptroller of the
MoreThe departments of Defense and Justice have both agreed that the Federal Communications Commission must improve the security of internet routing and provided recommendations on how to address vulnerabilities in the Border
More