The National Security Agency has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks but has been rebuffed by the White House, largely because of privacy concerns, according to administration officials and internal documents.
The Department of Defense (DOD) has made information technology reform an important part of its agenda throughout the Obama administration, and efforts to overhaul the department are finally starting to bear fruit. Within the last few months, the DOD formally shuttered the office of the assistant secretary of defense for networks and information integration (ASD/NII); […]
ARLINGTON, Va., Feb 23, 2012 (BUSINESS WIRE) — CACI International Inc CACI announced today that it has been awarded a $41 million task order to continue as lead developer of the Defense Agencies Initiative (DAI) solution sponsored by the Defense Logistics Agency (DLA). This task order falls under the Defense Information Systems Agency (DISA) Encore […]
The organization that sets federal technology standards is establishing a new center devoted to cybersecurity technology research across both the public and private sectors. A partnership between the National Institute for Standards and Technology (NIST), the state of Maryland, and Montgomery County, Md., will create the National Cybersecurity Center of Excellence, where NIST researchers can […]
The heightened surveillance of classified government information networks that was a predictable response to the unauthorized disclosures published by WikiLeaks is becoming more clearly discernible. “USSTRATCOM/USCYBERCOM is monitoring use of the SIPRNet and now has a mechanism for reporting certain anomalous behaviors for appropriate remediation,” said Thomas A. Ferguson, Deputy Under Secretary of Defense (Intelligence) […]
Air Force missions, such as persistent surveillance of large areas, require massive data analytics on supercomputers to deliver the critical capability of finding the proverbial ―needle in the haystack and thereby help humans avoid sensory overload. At another extreme, covert special operations forces have limited communications, limited time and limited battery capacity but need functionality […]