Defense IT


DHS getting a bad rap on cybersecurity?

Sen. John McCain's recent rant about DHS could make even an airline passenger feel sorry for the department.

FOSE 2012 serves up 5 courses of hot tech

FOSE offers five conferences in one: program slices on cloud computing, cybersecurity, mobile computing, defense innovation and records management.

Army, FBI training about to get Epic

Epic Games has licensed its Unreal Engine 3, which powers such multiplayer games as "Gears of War" and "Mass Effect," to several of the U.S. government's intelligence and defense agencies.

LulzSec Reborn? Military dating data dump may be work of reformed group

A band of hackers calling themselves "LulzSec Reborn" exposed the usernames and passwords of more than 170,000 subscribers to an online military dating service March 25. Or has it?

MUOS begins new era for defense satellites

The launch of the first Mobile User Objective System satellite in February marked a major step forward for the military's communications-on-the-move projects.

McCain slams DHS, wants DOD to defend cyberspace

A Senate budget hearing on the Defense Department's Strategic and Cyber Commands became a duel over how the nation's cyber defense should be structured.

GAO: Agencies expose themselves to IT supply-chain threats

The four departments with national security responsibilities haven't identified the threats or developed mitigation policies and procedures, a report states.

Army Cyber Command to streamline cyber defense process

The Army Cyber Command is changing its information assurance accreditation methods by increasing automation and training additional compliance teams.

Beyond rugged: Plastic 'bleeds' when damaged, then heals itself

Researchers' self-healing plastic, which turns red when damaged, could eventually be used in everything from smart phones and tablets to aircraft and bridges.

Is military ruggedization going, going, gone?

Formal ruggedization practices and procedures were once a necessity for the battlefield, but are they still essential for a military that increasingly relies on commercial-off-the-shelf computing and communications gear? Perhaps not.

DOD's 3 challenges in protecting cyber infrastructure

House and Senate budget hearings focused on defining DOD's role in defending a largely civilian cyberspace, and on the challenge of recruiting and retaining the workforce it needs.

DARPA: Dump passwords for always-on biometrics

The agency's Active Authentication program would analyze typing patterns and other behavioral traits so that a user's ID is continuously being confirmed.