The four departments with national security responsibilities haven't identified the threats or developed mitigation policies and procedures, a report states.
The Army Cyber Command is changing its information assurance accreditation methods by increasing automation and training additional compliance teams.
Researchers' self-healing plastic, which turns red when damaged, could eventually be used in everything from smart phones and tablets to aircraft and bridges.
Formal ruggedization practices and procedures were once a necessity for the battlefield, but are they still essential for a military that increasingly relies on commercial-off-the-shelf computing and communications gear? Perhaps not.
House and Senate budget hearings focused on defining DOD's role in defending a largely civilian cyberspace, and on the challenge of recruiting and retaining the workforce it needs.
The agency's Active Authentication program would analyze typing patterns and other behavioral traits so that a user's ID is continuously being confirmed.
The Army Software Marketplace prototype is a first step toward developing and delivering mobile apps to soldiers quickly.
Nobody claimed the grand prize in the quest to test the potential effectiveness of social media during a disaster.
The multiclimate LASR research facility features desert, rain forest and other environments for testing robots and unmanned vehicles in harsh climes.
The rapid global growth of satellite operators is causing substantial interference problems, experts say.
The Information Assurance Scholarship Program provides full rides for graduate and undergraduate students, and military and civilian DOD employees, in exchange for commitments to stay with DOD.
The ways DOD pays for and manages its leased civilian satellite communications networks are inefficient and needlessly expensive, one industry official says.