Radar & Electronic Warfare
 
 
 
 
 
 
 
 
 
Article Image
 
SALLY COLE, SENIOR EDITOR
 
As the U.S. Department of Defense (DoD) builds up its cyberwarfare programs, what sorts of cyber ops are North Korea and other nation-state adversaries focusing on? Does attribution or admission of responsibility actually act as a deterrent to other would-be cyberattackers?
 
 
 
 
 
 
Article Image
 
RUSSELL DOTY, RED HAT
 
Part 1 of this blog on blockchain for embedded systems (see July/August 2018 issue) explored one way of using blockchain technology for sensor data, especially where the integrity and provenance of the data must be verified. Blockchain is also useful for the other part of embedded systems: command and control.
 
 
 
 
 
 
Article Image
 
SAM HAMILTON & DR. ROBERT (BOB) GRAY, BAE SYSTEMS
 
Cyberattack has become the adversary's first weapon of choice, and military platforms, on land, air, sea, and space, are prime targets. Nation-state cyberattacks against military, contractor, and critical-infrastructure facilities are a daily occurrence, and...
 
 
 
 
 
 
 
 
Mercury Systems
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Department of Defense (DoD) and HackerOne officials launched the Department's sixth bug bounty program, Hack the Marine Corps. The bug bounty challenge will focus on Marine Corps' public-facing websites and services in order to harden the defenses of the Marine Corps Enterprise Network (MCEN).
 
 
 
 
 
 
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Army officials selected ManTech to collaboratively develop with four other companies a prototype for the U.S. Army's Persistent Cyber Training Environment (PCTE) through an Other Transaction Agreement (OTA)...
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Defense Advanced Research Projects Agency (DARPA) officials launched a new program dubbed Safe Documents (SafeDocs), which aims to improve software's ability to detect and reject invalid or maliciously crafted input data, without impacting the key functionality of new and existing electronic data formats.
 
 
 
 
 
 
 
 
 
 
 
Sponsored by: Wind River, Rockwell Collins
Date: September 27, 2:00 p.m. ET
REGISTER NOW
 
 
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Under the Defense Advanced Research Projects Agency's (DARPA) Grammar-Based Elicitation and Analysis of Requirements for Cyber Assured Systems Engineering (GearCASE) effort, Charles River Analytics Inc. is applying systemic functional grammars to increase cyber resilience.
 
 
 
 
 
 
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Officials at Mercury Systems, Inc. announced they are holding their first annual data-at-rest (DAR) technology forum for the Commercial Solutions for Classified (CSfC) program with participation from the National Security Agency (NSA).
 
 
 
 
 
Article Image
 
DAVID SHEETS, CURTISS-WRIGHT DEFENSE SOLUTIONS
 
The ability of an embedded system to identify, prevent, and respond to cyberattacks intended to disrupt its operational capabilities is defined by measuring its level of cybersecurity and cyber resiliency. 
 
 
 
 
 
 
 
 
Mercury Systems
 
 
 
 
 
 
Article Image
 
SALLY COLE, SENIOR EDITOR
 
The signature of the long-sought-after Majorana particle - a particle that has unusual properties believed to render it resistant to external interference - has been found by a group of researchers led by UCLA and funded by the U.S. Army. 
 
 
 
 
 
 
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Defense Information Systems Agency (DISA) officials selected technology consulting firm Attain, LLC. for the Compartmented Enterprise Services Organization (CESO) Program Management Office (PMO) to deliver mission-essential services across the Department of Defense (DoD), the intelligence community, and the civilian government.
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
The U.S. Department of Defense (DoD) has awarded has awarded three companies spots on a blanket purchase agreement (BPA) worth up to $551 million over five years to provide McAfee cybersecurity products across the DoD.
 
 
 
 
 
 
 
 
Omnetics
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Defense Advanced Research Projects Agency (DARPA) officials tapped BAE systems to develop data-driven, cyber-hunting tools that detect and analyze cyber threats to help protect extremely large enterprise networks. 
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
L3 Technologies has completed its acquisition of information-security companies Azimuth Security (Sydney, Australia) and Linchpin Labs (Ottawa, Canada).
 
 
 
 
 
 
 
 
MES
 
 
 
 
 
Facebook
 
Twitter
 
Linkedin