News

Meritorious Service Award Beth Armistead | Hampton Roads Chapter José Alberto Jesus Borges | Portugal Chapter Stephen Buck | Northern Virginia Chapter Coree Chandler | Lexington-Concord Chapter Sean ...
Improving public perception of reporting cyber crimes and allowing businesses a greater level of anonymity may foster a willingness to report.
Secondly, crews are working on maturing software factories. These are people, tools and processes that allow teams to constantly deliver value by launching software “to meet the needs of a specific ...
Technology transforms the military, reducing injuries and enhancing performance for warfighters in demanding roles.
The time when the Department of Defense and the intelligence community spearheaded the design of advanced command and control technologies is long past. To a large extent, innovation is now driven by ...
While technology consortiums to advance emerging technologies are not new, the Quantum Economic Development Consortium (QED-C), headquartered in Arlington, Virginia, is unique. The QED-C is a first-of ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Emerging cybersecurity technology innovations can and must support the design of more secure, resilient and efficient defense-critical supply chains, including microelectronics essential to national ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
The Coast Guard is increasing its partnering with the other services’ cyber components, Adm. Vann allowed. This includes “riding along” with their operations and offering reciprocity to those other ...
The increasing volume and sophistication of cyber threats have made semiautomated tools and techniques critical in detecting and responding to potential risks. Cybersecurity sensors are designed to ...
After several years of development and experimentation, U.S. Army officials are applying their initial continuous authority to operate (cATO) projects to existing software. The Department of Defense ...