Cyber Security
Heidi Shyu, research and development undersecretary, said she went looking for tech areas to trim—and found that some vital ones had been overlooked. When...
Hi, what are you looking for?
Heidi Shyu, research and development undersecretary, said she went looking for tech areas to trim—and found that some vital ones had been overlooked. When...
The long-awaited change to the background investigations process will flag concerning information for further investigation. All Defense Department clearance holders are now officially part...
The Defense Department has not ruled out a return to allowing companies to ‘self-attest’ their security posture. Hundreds of individuals have paid for their...
Even rendered inoperable, equipment now in the hands of the Taliban will yield troves of information about how the U.S. builds weapons and uses...
Leader of a Pentagon-wide DevSecOps initiative, Nicolas Chaillan cited lack of support from senior leadership as one reason for his departure. Nicolas Chaillan—the Air...
A failed wargame should make us think twice about “connect-everything” plans. The U.S. military “failed miserably” during a wargame scenario last fall when the...
Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past. The U.S. military must take deliberate steps to...
Augmentation techniques can help the Defense Department implement its data strategy goals. According to David Spirk, the Defense Department chief data officer, joint warfighting...
Experts say the doomed contract helped take cloud literacy at the Defense Department to the next level. It’s not every day that the government...
The Defense Critical Supply Chain Task Force released six legislative proposals calling for less dependence on adversaries like China and improved supply chain visibility....