The General Services Administration has awarded contracts to several Cherokee Federal companies for the One Acquisition Solution for Integrated Services Plus, or OASIS+, contracting program. Cherokee Nation Management & Consulting received an unrestricted OASIS+
MoreThe Defense Innovation Unit has appointed David Henry, a senior cyber leader, as deputy chief information officer. Henry announced his new position in a LinkedIn post published Wednesday. David Henry’s Career Background
MoreThe Office of the Under Secretary of Defense for Research and Engineering has issued new guidance designed to aid model-based systems engineers and architects in developing, presenting and analyzing model-based mission architectures.
MoreGeneral Services Administration official Laura Stanton discussed how GSA’s 8(a) STARS III governmentwide acquisition contract enables small businesses to provide IT platforms and services for the State Department to support critical government
MoreThe U.S. government has introduced a new cybersecurity label for commercial smart devices. The new U.S. Cyber Trust Mark, administered by the Federal Communications Commission, will enable consumers to make better-informed choices
MoreThe National Institute of Science and Technology is soliciting feedback on its draft guidance on using key-encapsulation mechanisms, or KEMs, for protection against cyberattacks using quantum computers. The guide follows up on
MoreNASA’s Kennedy Space Center and Florida University Space Research Consortium are collaborating to advance research and technology capabilities. The agency said officials from both organizations signed a memorandum of understanding during a ceremony
MoreThe Defense Counterintelligence and Security Agency has revealed that its National Background Investigation Services Program Management Office is making its product roadmap available to customers and stakeholders in the defense and federal sectors. The
MoreThe U.S. Army Yuma Proving Ground, or YPG, is advancing practical artificial intelligence use through its data architecture to support the post’s testing missions. The unit is continuing to develop its AI
MoreThe boards and other leaders of private sector companies could foster a culture of cybersecurity within their respective organizations by ensuring that chief information security officers possess sufficient influence and resources to
More