The Navy is turning the Next Generation Enterprise Network recompete into two separate contracts.
Maj. Michelle Rakers of the Marine Corps Band joins Women of Washington hosts Aileen Black and Gigi Schumm.
The Marine Corps is rolling out a system that allows service members in the field to pinpoint enemies for fire support.
The Defense Department’s $38.5 billion IT budget in the fiscal 2017 requests is being driven by three major trends contractors should be aware of: cybersecurity, cloud and analytics.
The Navy and Marine Corps are doing their part to build up a “hardened workforce,” which is a key part of federal CISO Greg Touhill’s strategic plan to strengthen cybersecurity.
Welcome to the #FedFeed, a daily collection of federal ephemera gathered from social media and presented for you enjoyment.
Ray Mabus became the longest-serving Navy secretary since Josephus Daniels, Woodrow Wilson’s secretary during the first world war.
Terry Halvorsen, the DoD chief information officer, signed a memo on Oct. 18 requiring military services and agencies to trust each other when accrediting and authorizing systems.
The Lohfeld Consulting group ranked upcoming civilian and DoD contracts that meet three criteria: a likely 2017 request for proposal, likelihood of funding and awards next fiscal year, a significant pool of contenders.
Although recent conflicts haven’t required the Marines Corps’ storied amphibious capability. It remains an important asset. Dan Goure, vice president of the Lexington Institute, joins Federal Drive with Tom Temin to discuss whether the Navy is buying enough amphibious ships to fully support the Marine Corps.
The Defense Department is taking growing pains in stride as it continues to work on its multi-year implementation plan of the cybersecurity system, the Joint Regional Security Stacks (JRSS).
Welcome to the #FedFeed, a daily collection of federal ephemera gathered from social media and presented for your enjoyment.
The Homeland Security Department and the Defense Department are among the agencies that are out in front in shifting their cyber focuses toward applications.
These episodes occur regularly, but it’s always hard to watch.