3 reasons software-defined networking is streamlining DOD IT

SDN is tailor-made for the consolidation, automation and security needs of the department, Juniper’s Brian Roach writes.

Army goes open source with forensic analysis tool

ARL has released Dshell, which it has used for five years to understand compromises of DOD networks, to GitHub.

DARPA doubles down on anti-counterfeiting program

The research agency awards two more contracts under the SHIELD program, which aims to ID counterfeit electronics anywhere in the supply chain.

Tiny components could help secure the IT supply chain

DARPA awards a $4.1 million contract under its SHIELD program to detect counterfeit parts.

New technology looks deep to identify counterfeit microchips

The Advanced Scanning Optical Microscope works at the nanometer level to help ensure the reliability of integrated circuits.

U.S. cyber plan seen as good first step, workforce issues remain

A government cybersecurity framework seeks to protect critical infrastructure, but industry groups continued to stress the need for training to keep up with threats.

DARPA’s online games crowdsource software security

The agency launches Verigames to see if streamlining the software verification process can be fun.

DOD gradually embracing open source

Lockheed Martin is touting an agile open source approach that it claims will boost information sharing.

Air Force looks to solve wind farm radar interference

The service hires AGI to develop a specialized modeling tool to help radar system designers account for the dead zones and false signals caused by wind turbines.

JIE is linchpin of next-generation classified cloud

DISA and the services are working to synchronize efforts toward developing, fielding a Joint Information Environment that promotes interoperability.

SAIC wins $21M Navy digital surveillance contract

Navy surveillance system will be upgraded with enhanced software, engineering services.

Leaked NSA documents shed little light on cybersecurity spending

Spread across four services with multiple agencies, cyber budgets are hard to track.

U.S., Russia, Canada partner in Joint Exercise Vigilant Eagle

Forces successfully hand-off escort for first time in NORAD hijacked aircraft simulation.

Maritime exercise marks milestone for U.S.-China joint operations

U.S. 5th Fleet participates with Chinese navy in bilateral counter-piracy scenarios.

Marine Corps mobile device strategy looks to cut costs

A 'bring-your-own-approved-device' strategy will allow users to gain secure access with personal devices while reducing costs.

DOD mobile pilot programs take shape to fit into departmentwide standards, policies

The department's three-part mobile strategy aims to securely connect over 600,000 devices.

Pentagon works to update cyberspace operation strategy

Cyber initiative group focuses on multilevel, holistic collaboration.