The U.S. Defense Department and its British counterpart have agreed to host and train military reservists from either the U.S. or the U.K. as part of the countries’ security cooperation efforts, DoD
MoreThe U.S. Defense Department‘s annual report to Congress on the Chinese military offers information about maritime tensions between China and neighboring countries. DoD has found that China implemented low-intensity coercive measures and
MoreMembers of the House Armed Services Committee voted 60-2 Thursday to pass a $585 billion defense policy bill, Defense News reported Thursday. John Bennett writes the HASC-approved 2016 National Defense Authorization Act
MoreDefense Secretary Ashton Carter has released a new strategic plan for the Defense Department to secure cyberspace operations and strengthen cybersecurity of weapon systems, the Washington Business Journal reported Thursday. Jill Aitoro
MoreStephen Preston, general counsel at the Defense Department, has said that President Barack Obama wants a new authorization to enforce use of military force in the U.S. fight against Islamic State terrorists,
MoreThe Defense Department seeks to access data rights for systems that DoD acquires from industry as part of the agency’s open architecture strategy under Better Buying Power 3.0, Federal News Radio reported
MoreSome government and industry executives have said at a Consortium for IT Software Quality-hosted forum that security management should be part of an organization’s software design and specifications, GCN reported Wednesday. Michael
MoreThe Defense Department is looking to increase the agency’s collaboration with industry under the Better Buying Power 3.0 program in order to capture the latest technologies for the U.S. military, DoD News
MoreJohn Conger — acting assistant defense secretary for energy, installations and environment — has said the Defense Department is willing to look into revising its Base Realignment and Closure process to obtain
MoreThe Defense Department is preparing new rules for weapons acquisition and guidelines on what program managers should do to avoid hacking of military technologies, Reuters reported Sunday. Andrea Shalal writes Katrina McFarland,
More