The Department of Homeland (DHS) Security’s Cybersecurity and Infrastructure Security Agency (CISA) has launched a strategy to help safeguard industrial control systems from cyber threats, CyberScoop reported Tuesday.
MoreA new Federal CIO Council report provides 10 recommendations on how agencies can improve the hiring process and develop the future information technology workforce. The report titled Future of the Federal IT
MoreEllen Lord, undersecretary for acquisition and sustainment at the Department of Defense and a 2020 Wash100 Award winner, said DoD may have to take some funds from its modernization and readiness accounts if Congress fails to provide
MoreArmy Research Laboratory, part of the service's Combat Capabilities Development Command, has introduced a new framework that would help soldiers obtain boosted situational awareness in low-bandwidth environments. A group of ARL scientists has enhanced
MoreThe U.S. Air Force has completed the T-7A Red Hawk aircraft's critical design review at Wright-Patterson AF Base after one year and a half of work and preparations. The CDR put Red Hawk's systems
MoreU.S. Air Force Maj. Gen. Charles Moore, director of operations at U.S. Cyber Command, has been assigned to serve as USCYBERCOM's deputy commander. He will also receive a promotion to lieutenant-general as he
MoreThe Department of Homeland Security's science and technology (DHS S&T) directorate has awarded 26 contracts to 23 small businesses through the first phase of the Small Business Innovation Research Program to explore
MoreA team from Dyess Air Force Base teamed up with civilian software developers to build a training facility that houses augmented and virtual reality technology capacities.
MoreBrig. Gen. Robert Collins, the U.S. Army’s program executive officer (PEO) for Command, Control and Communications – Tactical (C3T), has said the service branch’s tactical space intelligence program is a “significant focus
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has released a fact sheet on telephony denial of service attacks (TDoS) and how stakeholders can prevent these threats from disrupting public safety operations. CISA
More