Defense IT


CIOs outline tech priorities

IT leaders from the Defense, Commerce and Justice departments sketched out their agencies’ plans.

Maxwell Air Force Base (USDA/Wikimedia Commons)

Air Force tests wireless smart perimeter

Under an agreement between the Air Force and AT&T, Maxwell Air Force Base is testing a sensor network and facial recognition technology to improve base security.

code inspection (magic pictures/

Air Force widens military bug bounty program

For its bug bounty program, the Air Force is opening some of its public websites to vetted security specialists from some from the United Kingdom, Canada, Australia and New Zealand.

secure cloud (Nata-Lia/Shutterstock)

Box brings milspec security to its entire platform

DOD's authorization for Impact Level 4 means controls for sensitive unclassified information are now in place for all customers. FedRAMP High authorization is in the works and will also be platformwide.

analysis tools (VLADGRIN/

Building machine parts for intelligence analysts

IARPA is developing technologies that will enhance analysts’ decision-making capabilities.

communication across the power grid (chombosan/

Getting power to the grid after a cyber attack

DARPA is building a secure network that aims to operate without power or internet connectivity across disparate IT networks and grid infrastructure technologies.

task management system

Army HQ keeps work on track with collaborative task management tool

The Task Management Tool enables real-time visibility, automates the document-sharing process and eliminates the need for paper.

radio spectrum (DARPA)

DARPA pop-up testbed takes on spectrum management

A low-key competition for engineers tested techniques for sending and receiving information, like real-time intelligence data over the least crowded spectral bands.

cloud security (

NGA looks to ‘reinvent security’ with fast-churn cloud architecture

The National Geospatial-Intelligence Agency wants the flexibility to tear down its cloud architecture and rebuild it every day so that would-be attackers confront a confusing operating environment.

Six steps to securing additive manufacturing

Six steps to securing additive manufacturing

The Defense Department's maintenance and supply-chain challenges have made it a leader in additive manufacturing, but the next major hurdle will be ensuring that the technology is secure.

First person shooter (America

How the military is using ‘violent, chaotic, beautiful’ video games to train soldiers

Though their effectiveness as training tools is disputed, violent video games can be used for recruiting soldiers and promoting the geopolitical goals of the military.

smart military base

Making the case for smarter military bases

Military bases can benefit from technology that many American cities have already begun to test.

More from 1105 Public Sector Media Group