Cross-domain and risk-adaptive security can mitigate threats, fortify networks and clouds and keep missions on track.
The devices -- or more specifically, the chipsets embedded within them -- analyze a user's walking gait, location, facial structure and voice patterns to validate identity.
A new report from the Defense Department's operational test and evaluation director says the Joint Regional Security Stacks program is undermanned and should be halted until security issues are resolved.
A device now being piloted in DOD can continually use voice, facial recognition, location and walking gait to identify a user.
In its first civilian-focused hiring event, the Air Force’s software factory Kessel Run looks to bring on about 30 new personnel.
The research arm of the Defense Department looks to a Colorado mine for next leg of its tunnel mapping tech challenge.
Oracle's push to crack open Amazon's bid to run the DOD's $10 billion cloud program and hear from former Amazon employees was rejected by a judge.
Terry Carpenter, DISA's program executive officer for the National Background Investigation Service, talks about what to expect from a system in transition.
Judging takes place this weekend, so all Federal 100 Award submissions must be in by 6 p.m. ET on Friday, Jan. 25.
A Government Accountability Office recommendation doesn't account for the new Army Futures Command's overall approach, officials say.
Air Force Undersecretary Matthew Donovan pushes tech innovation and massive IT changes for the coming year.
Companies with a large market share are better able to innovate, according to the Pentagon's chief data officer -- making them more suitable for agencies’ long-term, multipurpose use.
Artificial intelligence will be a big part of the future acquisitions, particularly regarding air missile defense and other weapons systems, an Army acquisition exec says.
Sign up for our newsletter.
8251 Greensboro Drive, Suite 510, McLean, VA 22102