Defense IT


Army's 'Kraken' puts data from many sensors onto one screen

With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.

After what happened in Vegas, feds keep low profile at Black Hat

It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.

New ‘Universal Gateway’ speeds data to Navy vessels

Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.

Advanced radar would 'see' through jungle to catch drug smugglers

The project is one of many at the U.S. Army's SouthCom that combines IT expertise from multiple agencies, including foreign ones, to support forces in the field.

Army command gets collaborative with SharePoint portal

SharePoint lets CECOM’s 13,000 employees share information across the command, within organizations and individually.

Sensors, cloud, drive geospatial agency push for data-center space

Data-storage requirements caused by the growth of remote sensors and the move to cloud forced the National Geospatial Intelligence agency to expand its data center footprint.

DISA to lead defense cloud efforts

DOD aims to move the department's network applications from a "duplicative, cumbersome and costly set of application silos" to an environment offering greater agility and cost-effectiveness.

'Destructive' cyber attacks ahead, NSA's Alexander warns

The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.

Army's 'sense and avoid' radar will let drones fly in domestic airspace

Tests show that drones guided by the system can detect and avoid other aircraft, which will allow unmanned training flights any time day or night.

Sykipot variant, exploiting Microsoft vulnerability, targets aerospace industry

The information-stealing Trojan attacks the recently discovered flaw in XML Core Services, as well as Flash Player, and might be coming from China.

5 steps to setting up an agency app store

Building an app store can be the best way to make sure employees are using the right mobile apps. Here's a checklist to help you get there.

McCain’s retooled Secure IT act still a privacy threat, critics say

The controversial bill has been amended to protect civil liberties, but fails to win over critics who see it as an expansion of military authority and a threat to personal privacy.