DOD aims to move the department's network applications from a "duplicative, cumbersome and costly set of application silos" to an environment offering greater agility and cost-effectiveness.
The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.
Tests show that drones guided by the system can detect and avoid other aircraft, which will allow unmanned training flights any time day or night.
The information-stealing Trojan attacks the recently discovered flaw in XML Core Services, as well as Flash Player, and might be coming from China.
Building an app store can be the best way to make sure employees are using the right mobile apps. Here's a checklist to help you get there.
The controversial bill has been amended to protect civil liberties, but fails to win over critics who see it as an expansion of military authority and a threat to personal privacy.
Technique ionizes the air around the Laser-Induced Plasma Channel, allowing it to target anything that conducts electricity better than the ground it's sitting on.
A research team shows DHS and FAA how spoofing unencrypted GPS signals lets them take over drones in flight, potentially turning them into weapons.
The experimental technology could break new ground in satellite communications, terrestrial links and even fiber optics.
A focus on streamlining systems and delivering constituent services can help agency initiatives succeed in rocky times, a company executive says.
The Army's future IT savings will come from eliminating duplicate apps and moving the rest to another environment, says Col. Chris Miller.
The spyware, reportedly a U.S. cyber weapon targeting Iran, was being actively updated as recently as March and apparently was directed by an individual rather than being automated, according to Bit9 research.