Similar Articles |
|
National Defense January 2013 Valerie Insinna |
Defense Department Attempts to Eliminate Info-Tech Redundancies In 2013, infrastructure consolidation and interoperability will drive how the Defense Department spends its information technology budget, but companies might find growth in the area of tactical communications, said an analyst. |
National Defense May 2012 Teri Takai |
Creating a More Agile Defense Department Info-Tech Enterprise Secretary of Defense Leon Panetta in January released guidance that outlines a plan for shaping U.S. defense strategy. |
National Defense June 2015 Lloyd McCoy |
Navy IT Priorities Stress Security, Efficiency With the Navy projecting flat spending over the next few years, it will be looking to information technology to help meet its goals. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
National Defense February 2015 Meloni & McCoy Jr. |
Defense IT Investment to Focus on Big Data, Cloud As the Defense Department cuts spending on information technology, it is focusing on a "technological offset strategy" to counterbalance a shrinking fighting force. |
National Defense June 2014 Lloyd McCoy |
Defense IT Spending on Downslope With the defense budget under growing pressure, the Pentagon's chief information officer and budget leaders are looking at information technology as a way to do more with less. |
National Defense November 2012 Lambeth & Rhodes |
How to Manage the 'Cloud' for Greater Cost Savings In July, the Defense Department unveiled its ambitious new cloud computing strategy, which builds on a similar Obama administration strategy to address challenges, requirements and goals specific to Defense. |
National Defense August 2012 Dan Parsons |
Navy Leans on Commercial Technology for Computing Upgrades When the Navy finally boils down its sprawling information systems into two main networks, they will consist almost entirely of commercially available technology tweaked and retrofitted to meet military security standards. |
National Defense April 2014 Valerie Insinna |
Operations With Navy's New Afloat Network Get Underway The Navy intends to streamline the number of networks and modernizing hardware and software through the Consolidated Afloat Networks and Enterprise Services program, or CANES. |
National Defense November 2014 Stephanie Meloni |
Army Seeks to Simplify, Create More Interoperability for Information Systems Success in this simplification strategy may be a bellwether for cost savings across the Defense Department. |
National Defense October 2011 Stew Magnuson |
Navy Seeks More Control of its Expansive Computer Network Some 700,000 sailors, marines and civilians spread out across the United States, Japan and Puerto Rico rely on the Navy's intranet every day. |
National Defense January 2009 Sandra I. Erwin |
'Milspec' Technology Makes a Comeback A rising propensity to "militarize" the Defense Department's information networks will be making it more difficult for the Pentagon to take advantage of cutting-edge technologies from the commercial sector, say analysts and industry experts. |
National Defense August 2010 Thomas A. Benes |
How Will the Defense Industry Adjust to New Fiscal Realities? Given the country's current fiscal and political environment, everyone, including defense industry leaders, is expecting changes in military spending and acquisition policy. |
IEEE Spectrum November 2008 Robert N. Charette |
What's Wrong with Weapons Acquisitions? Escalating complexity, a shortage of trained workers, and crass politicization mean that most programs to develop new military systems fail to meet expectations. |
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
National Defense June 2015 Ted Girard |
How Defense Agencies Can Better Cope With Big Data The Defense Information Systems Agency's five-year strategic plan says big data capabilities are becoming essential to modern warfare. |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
Military & Aerospace Electronics April 2010 John Keller |
Lockheed Martin, Northrop Grumman to Provide Computers for Navy CANES Shipboard Networking Program Northrop Grumman Corp. and Lockheed Martin Corp. will provide the U.S. Navy with shipboard computers for the Consolidated Afloat Networks and Enterprise Services (CANES) program, under terms of contracts awarded in March. |
National Defense March 2012 Sandra I. Erwin |
The Coming Decade: A Slowdown In Spending, but No 'Procurement Holiday' Even under the worst-case scenario, defense budgets in the coming decade will be larger than they were in the last year of the Bush administration. |
National Defense December 2013 Valerie Insinna |
Cutting Costs a Top Goal for Government Network Managers Information technology leaders in federal and local government view budget constraints as an even bigger threat to infrastructure than cyber-attacks, according to a Cisco-sponsored survey conducted in September. |
Wall Street & Technology December 2, 2009 Penny Crosman |
Industry Aims to Secure Cloud The obstacle to large financial firms' use of public clouds has been security, but industry groups and vendors are working to fix this. And internal clouds, protected within a firm's own firewalls, are under construction. |
National Defense March 2014 Sandra I. Erwin |
In '15 Budget, Red Flags for Contractors If defense industry CEOs can draw any conclusion from the Pentagon's 2015 budget proposal it is that, except for the too-big-to-fail joint strike fighter, most of the military's modernization plan is on shaky ground. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
CFO September 1, 2008 Vincent Ryan |
A Place in the Cloud Cloud computing offers an enticing value proposition, but do the benefits justify the risks? |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
National Defense August 2012 Sandra I. Erwin |
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. |
National Defense March 2010 Anand Datla |
Government Contracting Culture Impedes Progress in Cybersecurity The government is spending billions of dollars on IT products and services but does not hold its vendors accountable for cyberintrusions. |
National Defense June 2007 Sandra I. Erwin |
More Services, Less Hardware Define Current Military Buildup In the midst of the largest military expansion since the Reagan administration, industry analysts warn that the gravy days cannot last much longer. |
National Defense April 2011 Sandra I. Erwin |
Contractors Advised to Focus Less On Stock Prices, More on Customers Pentagon contractors will have to think differently about their business if they want to maintain or improve the financial performance they have enjoyed over the past decade, insiders say. |
Military & Aerospace Electronics March 2006 John Keller |
DOD Budget Keeps Growing, Despite the Odds Top-ranking experts in government and industry have been warning of substantial impending cuts in defense spending for the past 18 months, yet when Pentagon leaders released their 2007 spending proposals, the numbers just kept on growing. |
National Defense March 2007 Lawrence P. Farrell |
Defense Budget Sets Stage for Tough Choices Ahead As Congress continues to dissect the details of the Bush administration's proposed defense budget for fiscal year 2008, it is becoming increasingly apparent that the nation's military faces a worrisome financial future. |
CIO October 15, 2003 Ben Worthen |
Security Alerts New warning system taps security contractors for attack data |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense January 2014 Stew Magnuson |
New Cyber Framework Aimed at Small, Mid-Tier Defense Companies A National Institute of Standards and Technology framework intended to help companies and organizations bolster their cybersecurity may have a big impact for small- and mid-tier defense contractors, experts said. |
CIO January 22, 2009 Bernard Golden |
The Case Against Cloud Computing, Part One The case against cloud computing being ready for the enterprise centers around issues of migration, compliance, management, SLAs and cost. In this multi-part-series, we'll examine the key arguments - and pick them apart. |
Wall Street & Technology June 16, 2009 Penny Crosman |
Wall Street Firms Form Enterprise Clouds A number of Wall Street firms are adopting cloud computing concepts internally to ease IT management and save money. |
InternetNews December 8, 2008 Richard Adhikari |
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. |
National Defense February 2016 Sandra I. Erwin |
CEOs Not Yet Ready to Take a Gamble Defense executives don't have clear answers as they weigh investment choices in an uncertain market. |
National Defense June 2011 Salow et al. |
Cloud Computing Trend Sparks Compliance Concerns Contractors should be prepared for request for proposals from federal, state and local entities seeking certifications as to adequate data protection procedures. |
InternetNews February 10, 2009 Kenneth Corbin |
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. |
InternetNews February 26, 2009 Richard Adhikari |
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. |
Bank Technology News August 2009 Rebecca Sausner |
New BI's in the Clouds The movement of enterprise IT, including analytics, to the cloud follows the progression of applications as they migrate outside banks' firewalls. |
The Motley Fool December 17, 2009 Eric Bleeker |
Hacking the Pentagon With $26 Iraqi insurgents provide another case study on the need for cyber security. While the market for defense-related cybersecurity solutions is currently small, it's set to grow at a fast pace. |
National Defense September 2011 Sandra I. Erwin |
As Pressure Grows to Cut Spending, the True Cost of Weapons Is Anyone's Guess A decade of soaring Pentagon spending is coming to an end, and it is leaving behind considerable fiscal wreckage. |
The Motley Fool February 2, 2010 Rich Smith |
Santa Claus, the Easter Bunny, and Defense Spending Cuts What do these three things have in common? Just like the mythical creatures, the threat to defense spending is a total myth. |
CIO October 1, 2012 Kenneth Corbin |
European Union Outlines New Cloud Strategy, Draws Praise in U.S. European authorities outline a proposal for a single set of rules to harmonize cloud computing among member states, with an eye toward a substantial economic boost. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
InternetNews December 6, 2010 |
Cisco, BMC Partner on Cloud Platform In a joint arrangement, Cisco's uniform service delivery hardware will be paired with BMC's Cloud Lifecycle Management technology in an integrated platform. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
CRM January 2013 Leonard Klie |
Building an Impenetrable Cloud Companies concerned about data security have more hybrid (public and private) cloud computing options. |