The White House is considering endorsing a cybersecurity ratings model developed by Peter Zatko’s Cyber Independent Testing Lab in an effort to help screen the safety level of software products, Nextgov reported Friday.
MoreThe Pentagon has authorized Israel to make modifications and repairs to the Lockheed Martin-built F-35 fighter jet, Wired reported Tuesday. Eric Adams writes Israel is set to receive the Joint Strike Fighter plane in
More by Jay Clemens
The Federal Deposit Insurance Corp. has suffered five data breach incidents of at least 10,000 records since October and plans to introduce new measures to step up network security at the agency, the
More by Jay Clemens
Lt. Gen. Christopher Bogdan, head of the F-35 Joint Program Office, has revealed that flight tests on the update to the F-35 fighter jet’s Block 3i software is near complete after contractors worked to
More by Jay Clemens
The National Institutes of Standards and Technology has published a report that seeks to help the Commerce Department identify research-and-development opportunities to leverage data analytics for use in public safety communications and
More by Jane Edwards
U.S. Army researchers have created a computer program designed to build three-dimensional avatars of uniformed personnel for use in the design of protective gear, equipment and vehicles, the Army reported April 4.
More by Jane Edwards
A brigade combat team under the U.S. Armyâs 1st Cavalry Division will be the last unit to use the Enhanced Position Location Reporting System as the service branch moves to update its communications network,
More by Jane Edwards
The U.S. Army held an industry day Thursday at the Defense Innovation Unit Experimental facility in Silicon Valley as part of a challenge that aims to evaluate and buy prototypes of cyber
More by Jane Edwards
A U.S. Air Force official has said the service branch has started to subject its F-35 fighter jets to combat mission tests against Russian- and Chinese-made aerial defense platforms through the use
More by Jane Edwards
The U.S. Army has deployed a new tool that works to help users screen the service branchâs network infrastructure for vulnerabilities and implement patches to protect the networks from potential cyber attacks,
More by Jane Edwards