The Air Force Institute of Technology’s Graduate School of Engineering and Management has inaugurated a new hypersonics research center that will deliver defense-related interdisciplinary solutions to address challenges in the development of
MoreEric Hysen, the Department of Homeland Security chief information officer, aims to increase the number of digital security workers through the Cybersecurity Talent Management System, Nextgov said Wednesday. CTMS received congressional approval a
MoreThe Food and Drug Administration has begun seeking industry input on its strategic plan to modernize its enterprise capabilities and services to improve customer experience. A notice published in the Federal Register
MoreThe U.S. Army intends to release a series of requests for information focused on artificial intelligence capabilities, testing and security in the next few months with plans to issue the RFI specific
MoreCol. Frank Biancardi is a seasoned pilot with over 10 years of U.S. Air Force experience, during which time he honed his skills in diplomacy, leadership and strategic planning. Biancardi will shed
MoreJustification and approval, most commonly referred to as J&A, is a critical document used when a contract is awarded to a contractor without the usual competitive process. It guarantees a fair and
MoreA well-written business plan is key to success in the competitive government contracting industry. It is a roadmap that outlines a contractor’s experience, capabilities and expertise as an ideal partner in fulfilling
MoreThe Defense Information Systems Agency has published security guidance for using the Crunchy Data PostgreSQL versions 13 to 16 within the Department of Defense to ensure information systems and software are protected
MoreStephane Bouatene, a senior information technology professional who has been with the National Geospatial-Intelligence Agency for nearly a decade, was named deputy director for cyber and enterprise operations within the Open IT
MoreThe Cybersecurity and Infrastructure Security Agency has published new guidance to support organizations’ efforts to address memory safety risks in open-source software, or OSS, projects. Titled “Exploring Memory Safety in Critical Open
More