Cybersecurity
Army announces bug bounty program
Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.
Cybersecurity
Why cyber needs to be front and center in the transition
Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.
People
Nicole E. Wilson
Contracting Officer's Representative and Management Analyst, Computer Hardware, Enterprise Software and Solutions, Department of the Army
People
Marc A. Santoro
Deputy Lead, Electromagnetic Railgun Fire Control Integrated Product Team, Naval Surface Warfare Center, Dahlgren Division, Department of the Navy
People
Lt. Themba D. Hinke
Navy Engineering Duty Officer and Project Manager for the Space and Naval Warfare Systems, Command's Space Field Activity, National Reconnaissance Office
People
Matthew Derenski
IT Cybersecurity Engineer, Office of the CIO, Jet Propulsion Laboratory, NASA
Acquisition
Emily E. Antos
Assistant Program Manager, Engineering Sea Warrior Program, Space and Naval Warfare Systems Center Atlantic, Department of the Navy
Acquisition
Palantir ruling could tweak Army's innovation track
Two top Army officials reflect on some of the innovation accomplishments of the Obama administration and the challenges that lie ahead for the incoming Trump administration.
Cybersecurity
All's quiet on the election cyber front, so far
Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.
Digital Government
Despite hype, level of election cyberthreats is uncertain
As Americans go to the polls to vote in a hotly contested election, federal officials will be behind the scenes watching for malicious cyber activity, even though there won't be much they can do in response.
Modernization
IOC just a first step for Cyber Mission Force
The 133 Cyber Mission Force teams called for in DOD's Cyber Strategy have reached initial operating capability, but the U.S. military is still a long way from being able to dominate the cyber domain.
Cybersecurity
Army CyberCom looks to boost training
The new head of the Army Cyber Command says the command has made significant progress in recent years, but needs to focus on identifying and recruiting new talent and making training programs more realistic for cyber forces.
Cybersecurity
DOD, DHS chart paths to acquisition innovation
DOD and DHS are both trying to tap into the best the tech sector has to offer, and each agency has new and experimental contracting mechanisms that are showing signs of short-circuiting existing procedures.
Modernization
DOD CIO: Recent GAO criticism of JIE is off base
Halvorsen says GAO's report criticizing the management and oversight of the Joint Information Environment initiative fails to understand the nature of the project.
Digital Government
DOD to create chief innovation officer position
Defense Secretary Ash Carter is implementing some of the initial recommendations of the Defense Innovation Board, including the creation of a new position to drive innovation efforts.
Cybersecurity
CIA to put millions of declassified documents online
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Modernization
DOJ releases controversial cybercrime prosecution memo
More than two years after Attorney General Eric Holder penned a memo to federal prosecutors offering guidance on pursuing cases under the Computer Fraud and Abuse Act, litigation prompted the DOJ to release the document to the public.
Cybersecurity
Finalizing cyber incident response might be easier than deciding when to use it
The revised National Cyber Incident Response Plan is on track to be completed by the end of the year, but the more difficult challenge might be determining when a cyber incident reaches a threshold that activates the plan.
Digital Government
DOD service chiefs survey the threat landscape
As the Obama administration nears its end, the service secretaries say technological threats will continue to grow and the DOD must reform how it develops systems and its workforce to keep pace with adversaries.
Almost There!
Help us tailor content specifically for you: