The Department of Defense on Wednesday released a new intellectual property strategy that would create a cadre to provide assistance to DoD agencies with regard to IP licensing and management, Federal News
MoreBooz Allen Hamilton announced on Friday that the company has entered into an agreement, under its joint venture partner agreement with the U.S. Department of Commerce’s National Technical Information Service (NTIS), to
MoreKatie Arrington, chief information security officer of the Department of Defense’s acquisition policy office, has said that a “change of culture” in government acquisition is necessary to prevent theft by foreign adversaries, Cyberscoop
MoreThe Department of Defense plans to cover six topics during an artificial intelligence-focused event that is scheduled to take place on Nov. 13 in Maryland, according to a FedBizOpps notice posted Wednesday.
MoreThe Department of Defense is working on security guidance to prepare for cloud deployment once the Joint Enterprise Defense Infrastructure contract is awarded, FedScoop reported Thursday.
More by Jane Edwards
Lt. Gen. Thomas Horlander, military deputy to the Army’s assistant secretary, has said that the service’s Command Accountability and Execution Review program helped the service optimize its purchasing activities.
MoreDouglas Loverro, former deputy assistant secretary for space policy at the Department of Defense, has been appointed associate administrator of NASA's human exploration and operations mission directorate.
MoreCyber Command has collaborated with the Department of Energy and the energy sector through the Grid X exercise to further build up their relationship in the event of a cyber attack on
More by Jane Edwards
Ellen Lord, defense undersecretary for acquisition and sustainment and a 2019 Wash100 Award winner, said the Department of Defense’s review of “fourth estate” agencies could impact offices that have no direct ties to
More by Jane Edwards
The Department of Defense has conducted a bug bounty program with ethical hackers in an effort to identify vulnerabilities in the DoD Information Network, Fifth Domain reported Monday.
More