Deputy Defense Secretary Robert Work has said the Defense Department has started to invest in combat teaming and human-machine collaboration as part of the third offset strategy, DoD News reported Sunday. Work
MoreThe General Services Administration has unveiled the availability of 17 category hallways on the agency Acquisition Gateway online portal as part of GSA’s efforts to streamline government acquisition initiatives. John Felleman, senior innovation
MoreCarlos Cases, formerly special agent responsible for the San Juan division at FBI, has been named assistant director of the international operations division at the bureauâs headquarters in Washington. Cases will begin in
More by Jane Edwards
Some U.S. companies believe a cyber warfare is looming due to the federal government’s hesitation to retaliate against foreign hackers or allow companies to strike back, FCW reported Friday. Zach Noble writes government and industry participants at
MoreLt. Gen. Kenneth Dahl has been appointed as commanding general of U.S. Army Installation Management Command. He succeeds Lt. Gen. David Halverson, who passed IMCOM’s colors to Dahl during a change-of-command ceremony
More by Jay Clemens
The Defense Department has released a new guidebook that contains practices for integrating cybersecurity into the acquisition lifecycle in an effort to help systems recover from cyber attacks. In a memorandum published
More by Jay Clemens
The U.S. Computer Emergency Readiness Team has provided a list of strategies it believes public and private sector organizations should adopt to minimize cybersecurity risks to their information technology systems. Noah Kunin, director of
MoreGregory Cox, formerly head of the counterintelligence division at the FBI, has been appointed assistant director of the critical incident response group at the bureauâs office in Quantico, Virginia. Cox was global
More by Jane Edwards
A new MeriTalk study underwritten by Palo Alto Networks says 89 percent of federal information technology executives say their agenciesâ standards and policies on endpoint security need to be improved. The report titled âEndpoint
More by Jane Edwards
The National Institute of Standards and Technology has released draft guidance on how private enterprises can manage the cybersecurity of sensitive business data that employees store or access in mobile devices. NIST
More