Digital Government

Agencies can’t bar feds from joining suspect foreign firms

Chinese telecom giant Huawei is grabbing former U.S. officials to gain market access.

Cybersecurity

DHS center could extend classified Pentagon cyber program to nondefense industries

The National Cybersecurity and Communications Integration Center is disclosing sensitive intelligence to cleared companies.

Cybersecurity

Toy drone duel outwits FAA, but not hackers

Stunt with store-bought robotic helicopters teaches a lesson in cybersecurity and inadequate airspace regulations.

Cybersecurity

Feds, Ahmadinejad security detail at UN face communication issues

Smartphone apps providing temporary secure lines of communications may solve trust and compatibility problems at future high-profile events.

Emerging Tech

TSA pays $245 million for smaller, faster body scanners

L-3 Communications, American Science and Engineering, and Smiths score contracts.

Emerging Tech

October liftoff set for $1.6 billion SpaceX rocket program

Private spaceship will make its first official voyage to the International Space Station.

Cybersecurity

Coming soon to a military theater near you: The Age of Surprise

Air Force grad students, video producers air trailer-like preview of conflict in 2035.

Modernization

Sequestration could hurt cyber defense programs

Deep budget cuts will make it difficult for feds to press industry on cybersecurity.

Digital Government

Homeland Security pays $46 million for counter-IED tools

A-T Solutions clinched a contract to aid the public and private sectors in stopping domestic bombings.

Cybersecurity

Defining the Known Unknowns in Cyberspace

Deterring adversaries from attacking U.S. networks starts with shared terminology.

Digital Government

State can’t track drone exports

Incomplete database risks releasing sensitive technology to adversaries.

Modernization

Feds reject counterterrorism reporting apps over privacy, security concerns

Some states, meanwhile, offer citizens smartphone tools for alerting authorities to suspicious behavior.

Emerging Tech

Get ready for computers worldwide to automatically smother cyber strikes

‘Cyber ecosystem’ could mimic dynamics of the human immune system to isolate and contain threats robotically.

Cybersecurity

BYOD security monitoring is not the norm

Study finds 62 percent of federal security pros lack systems for tracking government data on personal smartphones.

Cybersecurity

Stop computer prodigies before they hack

Cybersecurity competitions can be fertile ground for potential attackers.

Cybersecurity

Obama campaign plank hints at cyber executive order

The DNC platform says President Obama will continue taking ‘executive action’ to bolster computer security in the wake of Congressional inaction.