The Department of Defense has proposed a rule to update cost and software data reporting requirements for contracts above certain thresholds awarded in support of acquisition or sustainment programs that are expected
The Federal Trade Commission (FTC) has cited laws and best practices that artificial intelligence developers and users should consider to promote fairness, truth and equity in the use of AI. FTC enforces
MoreThe Department of Defense (DOD) plans to spend approximately $18 billion on the Next Generation Interceptor program that seeks to counter intercontinental ballistic missile threats. MDA expects the critical design review phase to
MoreThe FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) have released a joint advisory to provide information on cyber tools and techniques used by Russian Foreign Intelligence
MoreThe Department of Defense’s (DOD) office of inspector general (OIG) has recommended that DOD contracting personnel establish policies for tracking other transaction agreements awarded through consortia and work with the General Services
MoreThe U.S. Army opened its first software factory at the Austin Community College in Texas that will develop new applications and train soldier-coders on how to adopt technology to improve operations. “This
MoreThe Department of Commerce’s (DOC) office of inspector general has issued a management alert stating that the Business Applications Solution (BAS) program’s focus on technology may miss business process-related risks. The BAS
MoreJohn Sherman, acting chief information officer of the Department of Defense (DOD), said DOD plans to issue a strategy for zero trust architecture in 2021 as part of efforts to enhance the
MorePresident Biden has announced plans to nominate seven individuals to serve in key national security roles at the departments of State and Defense. DOD nominees are Brenda Sue Fulton, Christopher Maier, Deborah
MoreThe Federal Communications Commission (FCC) has implemented new rules to support commercial satellite launches and related operations by providing the space sector access to spectrum in the 2200-2290 MHz band. The move
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has identified a malware dubbed Supernova used by advanced persistent threat actors to compromise an organization’s enterprise network through a Pulse Secure virtual private network
More