Defense IT

'Janitor satellite' would clean up space junk

The Swiss Space Center's CleanSpace One project aims to help sweep the orbital paths of dangerous debris, but let's hope it's not one piece at a time.

Army's mobile comm system gains field experience before NIE

The Army's WIN-T program is using recent exercises in New Mexico to ready itself for a major evaluation this spring.

Anonymous gets NSA's attention, promises regular Friday attacks

The hacker collective plans regular strikes against government and corporate sites, while NSA's chief reportedly is concerned the group could soon be capable of attacking the power grid.

Bipartisan cyber bill now the center of partisan turf war

Sen. Joe Lieberman's attempt to strike the "right balance" draws the ire of Sen. John McCain and other GOP leaders, who are planning their own bill.

Air Force aims to unify robot aircraft controls

The Air Force is doing more with less by developing control and sensor systems that work across many platforms and reduce the number of unmanned aircraft systems and controllers needed for operations.

Spear-phishing campaign targets gov addresses taken in Stratfor hack

E-mail addresses posted after a hack of intell analysis company Stratfor are being used in a spear-phishing campaign targeting its subscribers.

Google closes in on Motorola Mobility acquisition

Both companies have been playing a part in the military's move toward smart phones.

Where does the IT money go in 2013 budget proposal?

Obama's 2013 budget proposal aims to cut federal IT but increase its use when it makes government more efficient. Here's where 10 departments stand.

Cybersecurity research gets boost in 2013 budget request

Cybersecurity is identified as a priority for basic research in the president's budget request for fiscal 2013, with large investments proposed for DOD, DHS and NSF.

CE Secure Vault

Key drives a security risk? Not when they're made like this.

The CE-Secure Vault from CMS Products will keep data in transit safe from both the elements and hackers.

Could NSA's whitelisting approach to security catch on in government?

Protecting systems by blocking everything but approved apps has been difficult to manage, but NSA's approach could provide a template.

US energy systems have disaster written all over them

Bringing new, localized sources of energy online in a smart grid would help to create a resilient, independent energy system and could foil potential cyberattacks to boot.