The Army's future IT savings will come from eliminating duplicate apps and moving the rest to another environment, says Col. Chris Miller.
The spyware, reportedly a U.S. cyber weapon targeting Iran, was being actively updated as recently as March and apparently was directed by an individual rather than being automated, according to Bit9 research.
As defense agencies embrace cloud computing, many are finding that cloud solutions deemed good enough for consumers can't handle their unique requirements.
An agency pilot program pursues data provenance, which seeks to trace the origins, accuracy and life cycle of the data NSA collects.
The Air Force Medical Service is implementing SAS Business Intelligence and Analytics software to improve operational and clinical decision support.
Kaspersky Lab says an early Stuxnet version used code from Flame; separate research reveals "world-class" crypto behind Flame's attack.
Saying that the window of opportunity to pass critical legislation is quickly disappearing, seven former Pentagon, Homeland Security and intelligence officials urged Senate leaders to bring cybersecurity legislation to the floor.
FAA regulations, including a requirement that UAS operators maintain a visual line of sight with the aircraft, are slowing scientific uses of technology, say developers.
As a part of its broader mobile device efforts, the Army has begun training efforts to teach soldiers how to write their own apps and then make them available for download.
Confirmation that the United States was behind the Stuxnet attack on Iran sheds light on the broadening pattern of international cyber espionage and renews questions about the country's own cyber defenses.
The recently identified Flamer malware appears to be the first to use Bluetooth as a tool for keeping tabs on its victims, researchers say.
The agency is building the architecture for the Defense Department's mobile network and expects to have it at least partly up and running by the end of the year.