Advanced Search
The Defense Department's common access card will continue to be a major component of the Pentagon's evolving identity management strategy, DOD CIO Dana Deasy said. Read More
To better train military inspectors general, the Army wants role-playing simulations that will enhance investigative skills in whistleblower reprisal inquiries. Read More
DOD employees can now use government-purchased Galaxy S9 smartphones with the Defense Information Systems Agency's DOD Mobility Unclassified Capability. Read More
Six defense projects and three military Rising Stars are among this year's winners. Read More
The Army chooses 14 small businesses for a $499 million professional services contract. Read More
The new Army Futures Command aims to meld all of the service's modernization efforts under one command, but for now the Army program executive officer structure will remain in place. Read More
Centralizing data related to the Defense Department's work with commercial satellites could be one of the first tasks for a “Space Force.” Read More
Science Applications International Corp. wins a recompeted $861.1 million Navy "C4ISR" system production and delivery contract. Read More
Vice President Mike Pence announced the Defense Department’s plan to create the military’s sixth branch. Read More
The Defense Department now prohibits personnel from using geolocation devices, applications or services in any area where military operations are being conducted. Read More
National Background Investigations Bureau Director Charles Phalen discusses the Trump administration's plan to move the organization under the Defense Department. Read More
The Air Force is seeking proposals across a wide range of sub-disciplines. Read More
Air Force Gen. Ellen Pawlikowski, commander of Air Force Materiel Command, will retire in September. Read More
The 2019 National Defense Authorization Act heads to the White House, avoiding a late-year debate, after the Senate passed the conference report 87-10. Read More
Nation-state groups combine cyber exploitation with supply chain operations, human recruitment and the acquisition of knowledge by foreign students in U.S. universities to steal or acquire trade secrets from U.S. technology sectors. Read More
Sign up for our newsletter.
I agree to this site's Privacy Policy.