The Missile Defense Agency (MDA) has reported the need for a new approach to managing the ground-based, anti-missile system to protect the nation. Vice Adm. Jon Hill, MDA director, reported that the
MoreThe National Institute for Standards and Technology (NIST) has published its NIST SP 800-172 to provide advice for contractors that handle sensitive information that could be threatened by adversarial nation-states. “Cyberattacks are
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has extended the term of a supply-chain security task force for an additional six months to continue efforts to protect the information and communications technology sector.
MoreThe National Cyber Investigative Joint Task Force (NCIJTF), a partnership between multiple security and intelligence agencies, has published a new fact sheet made to educate the masses on ransomware threats. Subject matter
MoreTelos has been awarded a potential $13.5 million contract by the Federal Bureau of Investigation (FBI) to integrate the company’s Xacta solution and establish an interactive, real-time risk assessment capability across its
MoreVMware has announced innovations across its VMware vRealize Cloud Management portfolio of on-premises and Software as a Service (SaaS) solutions, which will enable customers to securely deploy and operate hybrid and multi-cloud
MoreA National Defense Industrial Association (NDIA) report on the defense industrial base’s health shows that the Department of Defense’s (DOD) use of other transaction authority (OTA) agreements to encourage non-traditional vendors to
MoreThe White House has issued a new memorandum announcing the renewal of the National Security Council (NSC) system. The memo details the regular attendees of NSC meetings and the structure of the
MoreBrig. Gen. Heather Pringle, commander of the Air Force Research Laboratory (AFRL), said the service will conduct a second test of the Golden Horde swarming bombs later in Feb. 2021. “We’re looking
MoreIdaho National Laboratory (INL) created an approach that employs engineering design principles to mitigate cyberattacks on utility operations. INL Cybersecurity Researchers Sarah Freeman and Andy Bochman released a book that tackles the
More