The Air Force's in-house software factories have become hacking targets because they are accelerating the service's fielding of new capabilities, and must be defended as the "crown jewels" they are. The Pentagon needs to apply "Zero-Trust" technology in its data systems, not only keeping hackers ...
The Trump Administration released a new national technology strategy on Oct. 15, which assigns investment priority to 20 technologies while calling for an all-of-government approach to develop and protect them. The Pentagon is already applying a number of the actions the new strategy lays out, ...
Eight groups of hackers attempted to to take control of a Defense Department satellite on Aug. 9. The weekend-long event, called “Hack-A-Sat,” was intended to spur interest in cybersecurity and help the DOD and the Air Force learn about unforeseen security risks. The event was ...
In its latest round of recommendations to Congress formalized July 21, the National Security Commission on Artificial Intelligence suggests ways to get high-tech employees trained and then locked into federal service commitments—ideas modeled after the military service academies and ROTC programs. The NSCAI proposes a ...
The Air Force is making a big push to move blockchain, the much-hyped cryptographic technology that powers Bitcoin and most other digital currencies, from the lab to the battlefield. Because it creates an unforgeable and unalterable record, advocates see blockchain as invaluable for protecting data, ...
The competition is open for the next cohort of small and innovative companies vying to benefit from a three-month residency at the Colorado Springs campus of the Catalyst Space Accelerator. As many as 40 startups are expected to apply for the eight slots available, developing ...
The Pentagon has taken some positive steps to keep out cyberattacks, but it’s unclear how consistently those measures are enforced across the vast department, according to a new Government Accountability Office report. “As DOD has become increasingly reliant on IT systems and networks to conduct ...
The Air Force’s current procedure for certifying new IT equipment or software is infamous. To get Authority to Operate (ATO) requires voluminous documentation and can take weeks or months. To get new capabilities to the warfighter faster, Air Force leaders last year authorized a new ...
Gen. Charles Q. Brown sat down with reporters at AFA’s Air Warfare Symposium, just days before officially being tapped as the next Chief of Staff of the Air Force. The wide-ranging interview touched on Joint All-Domain Command and Control, logistics while under attack, the challenges ...
A health of the defense industrial base was given a grade of "C" by the National Defense Industrial Association in a report released Feb. 5. The NDIA says the report will be issued annually to gauge whether the industrial base is able to surge at ...
The US government needs to take a closer look at what could deter a war with China as the Pentagon shifts its focus to security in the Indo-Pacific region and competition between world powers, defense experts told House lawmakers Jan. 15. Modern deterrence theory is ...
The cyberattacks from Iran widely anticipated as a response to the US targeted killing of one of their top generals have not materialized—at least not so far. Cyber is just one weapon in Tehran’s asymmetric arsenal, alongside its proxy terror networks and misinformation machine, and ...