The U.S. military is employing a mixture of procurement contracts and innovative practices to speed up the acquisition of defensive and offensive cyber technology.
The second draft RFP, answers to questions and the cover memo raise more questions regarding the Defense Department’s justification for a single award strategy.
Michael Beckerman, the president and CEO of the Internet Association, makes the case for why agencies should adopt commercial cloud services.
The Army’s new framework for a rapid process to acquire cyber defensive tools is a good example of how DoD acquisition systems are about providing the warfighters as much capability as possible.
Jeff Neal, senior vice president at ICF and former chief human capital officer at DHS, examines whether federal employees soon will see governmentwide pay for performance.
Chris Howard, the vice president of federal sales for Nutanix, explains why a multi-cloud environment for the military makes more sense.
National Guard units are ramping up their defensive cyber capabilities across the board, and will soon be able to quickly respond to cyber attacks in their home states and territories.
In locations with fewer federal workers and/or fewer high grade jobs, promotion opportunities for employees in lower grade jobs are more limited than that of employees at the same grade in the D.C. region.
Jeff Peters, the director of the national government sector for Esri, makes the case for integrating GIS into your cyber defenses.
U.S. Transportation Command (TRANSCOM ) has tested a few off-the-shelf transportation management systems, and is in negotiations to buy one to help streamline its legacy systems.
The Army and Navy have begun releasing these Cyber Mission Forces (CMF) into the wilds of their network protection efforts.
On this episode of CyberChat, host Sean Kelley, former EPA CISO, is joined by James Scott, senior ICIT fellow and author of Information Warfare: The Meme is the Embryo of the Narrative Illusion.
This week, the Coalition for Government Procurement hosted a forum entitled, “The $50 Billion e-Commerce Question: Section 846 Implementation Plan — Next Steps.”
Unlike their civilian agencies, U.S. defense agencies responsibilities include dealing with asymmetric threats — hostile adversaries using commercially available technologies that, in many cases, are far superior to what the government has on hand.