Radar & Electronic Warfare
 
 
 
 
 
 
 
 
 
Article Image
 
SALLY COLE, SENIOR EDITOR
 
Software-defined open virtualization solutions are a smart way to implement next-gen military systems: They're easier to maintain and enable future software and hardware upgrades with minimal risks, costs, and downtime.
 
 
 
 
 
 
Article Image
 
SALLY COLE, EDITORIAL CALENDAR
 
Two international teams of security researchers have independently and concurrently discovered "Foreshadow," a new variant of the hardware vulnerability known as "Meltdown" that was announced earlier this year. Meltdown can be exploited to bypass Intel processors' secure regions to access memory and data.
 
 
 
 
 
 
Article Image
 
PHIL GALLAGHER, AVNET
 
In response to the growing nexus between physical risk (counterfeits) and cyber risk (infiltration of systems and exfiltration of data) the U.S. Department of Defense (DoD) has introduced a new policy adding security as a fundamental pillar of federal acquisition and supply chain risk management. 
 
 
 
 
 
 
 
 
Omnetics
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
The Raytheon-built Global Position System Next-Generation Operational Control System (GPS OCX) completed cybersecurity vulnerability assessments that tested the system's ability to defend against both internal and external cyber threats.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Air Force officials -- the acting acquisition authority for the U.S. Cyber Command (USCYBERCOM) Unified Platform program -- selected Northrop Grumman Corp. to serve as the program's Unified Platform systems coordinator under a contract valued an estimated $54.6 million.
 
 
 
 
 
 
 
 
 
 
 
Sponsored by: Core Avionics & Industrial inc., Curtiss-Wright, Wind
Date: November 14, 11:00 a.m. ET
REGISTER NOW
 
 
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Officials at the U.S. Military Academy (USMA) at West Point signed a Cooperative Research and Development Agreement (CRADA) with Enlighten IT Consulting -- a MacAulay-Brown, Inc. (MacB) subsidiary, an Alion Company.
 
 
 
 
 
 
Article Image
 
MIKE SOUTHWORTH, CURTISS-WRIGHT DEFENSE SOLUTIONS
 
As advanced network features and increasing speeds are added to next-generation rugged embedded switches, these products become even more useful for military applications by helping to reduce system size, weight, power, and cost (SWaP-C) through a reduction of cabling and the use of Layer 3 switches for basic network routing duties.
 
 
 
 
 
 
 
 
Omnetics
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
Perspecta Inc. research arm Perspecta Labs has obtained a prime contract from the U.S. Defense Advanced Research Projects Agency (DARPA) to support the Cyber-Hunting at Scale (CHASE) program.
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
Naval Sea Systems Command (NAVSEA) recently hosted HACKtheMACHINE, the Navy's digital experience for building a community of practice in maritime security.
 
 
 
 
 
 
 
 
Mercury Systems
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
Information-technology (IT) services company Perspecta Inc. received a $787 million contract extension from the U.S. Department of the Navy to continue to provide IT services. The award calls for Perspecta to continue providing services for an additional year, through September 2019.
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
Department of Defense (DoD) officials awarded a third crowdsourced security contract to HackerOne in order to help strengthen sensitive DoD assets.
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
The U.S. Department of Defense (DoD) and HackerOne, the leading hacker-powered security platform, announced the results of the DoD's sixth public bug bounty program.
 
 
 
 
 
 
 
 
MES
 
 
 
 
 
Facebook
 
Twitter
 
Linkedin