Fully Homomorphic Encryption is considered the “holy grail” of encryption. But right now it takes too much compute power to be used widely. The Defense Advanced...
The Joint Chiefs chairman says the organizations have not yet worked out how to keep the data flowing after the long-awaited split. Despite years of waiting and a last-minute...
The audit found the Defense Department has improved weapon systems cybersecurity in recent years, but detailed requirements must make it into contracts. Despite the Defense Department’s...
Rep. Adam Smith, D-Wash., suggested a 500-ship Navy is inadequate if adversaries are able to disrupt command and control systems. House Armed Services Committee Chair Adam...
In a contentious nomination hearing, Colin Kahl called for a whole-of-government approach to technology. In between heated questions from Republican senators about tweets and arguments over...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets, security threats...
The group initiated 23 new projects and transitioned 11 capabilities to Defense Department partners last year, according to its annual report. Five years after it was...
In response to a Trump administration executive order, Joint Base San Antonio is getting ready to test its infrastructure against a simulated electromagnetic pulse attack. An...
Air Force Chief Information Officer Lauren Knausenberger said she’s changing minds by demonstrating utility to the warfighter. Cultural barriers within federal agencies and government entities as...
A new document details military considerations regarding future means to transport data. The U.S. military moved to explore next-generation networking capabilities and tools that could advance...
Recent Comments