News
The 2025 Army Intelligence Industry Day brings together key leaders from Army Acquisition, Army Intelligence and Army Program Management to help industry gain insights into the technologies, ...
An ex-defense official is asking for artificial intelligence and large language models to evolve the practice and transform security classification guides.
One private sector executive is requesting that Department of Defense (DOD) leaders start shifting toward a more proactive approach to cybersecurity. One way federal officials can begin to make this ...
Mercury Systems, Chelmsford, Massachusetts, has tapped Jamie Ryan as chief information officer.
The time when the Department of Defense and the intelligence community spearheaded the design of advanced command and control technologies is long past. To a large extent, innovation is now driven by ...
Emerging cybersecurity technology innovations can and must support the design of more secure, resilient and efficient defense-critical supply chains, including microelectronics essential to national ...
An IARPA effort may already be influencing artificial intelligence cybersecurity.
The 3-year-old Cybersecurity Directorate (CSD) at the 70-year-old National Security Agency/Central Security Service (NSA) is growing, especially in Texas. While the agency’s headquarters is at Ft.
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...
After several years of development and experimentation, U.S. Army officials are applying their initial continuous authority to operate (cATO) projects to existing software. The Department of Defense ...
The Air Force examines scenarios and technology to discern command, control and communications needed for tactical application.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results