Category: Technology

Okta’s Habib Hourani: TIC 3.0 Guidance, Adaptive Security Model Help Agencies Protect Cloud IT EnvironmentsNews

Okta’s Habib Hourani: TIC 3.0 Guidance, Adaptive Security Model Help Agencies Protect Cloud IT Environments

Habib Hourani, a solutions engineer at San Francisco-based identity management services provider Okta (Nasdaq: OKTA), said the U.S. government is…
CMMC Accreditation Body Names 11 Licensed Partner Publishers; Ben Tchoubineh QuotedNews

CMMC Accreditation Body Names 11 Licensed Partner Publishers; Ben Tchoubineh Quoted

The accreditation body of the Cybersecurity Maturity Model Certification has cleared 11 licensed partner publishers that will provide education curricula.
Chuck Brooks: Innovation is Strengthening the Federal Cybersecurity WorkforceNews

Chuck Brooks: Innovation is Strengthening the Federal Cybersecurity Workforce

GovCon Expert Chuck Brooks has published his latest article as a member of Executive Mosaic’s GovCon Expert program on Friday. Brooks discussed the federal…
Frost & Sullivan: DoD’s C4ISR Spending Could Reach $58.5B by 2025News

Frost & Sullivan: DoD’s C4ISR Spending Could Reach $58.5B by 2025

A new Frost & Sullivan analysis estimates the Department of Defense’s spending on command, control, communications, computers, intelligence, surveillance and reconnaissance systems could…
Cowen Analysis Says USAF Spending on GBSD, B-21 Bomber Could Hit $10.2B by 2027News

Cowen Analysis Says USAF Spending on GBSD, B-21 Bomber Could Hit $10.2B by 2027

Cowen Washington Research Group estimates the U.S. Air Force’s annual combined spending on the Ground-Based Strategic Deterrent intercontinental ballistic missile…
GDIT’s Jeffrey Phelan: Cloud Offering Security Control Inheritance Could Benefit DoD Mission PartnersNews

GDIT’s Jeffrey Phelan: Cloud Offering Security Control Inheritance Could Benefit DoD Mission Partners

Jeffrey Phelan, milCloud 2.0 cloud services portfolio lead at General Dynamics’ (NYSE: GD) information technology business, said Department of Defense…
AFRL Issues RFI on Advanced Battle Management System’s C2 Application ComponentNews

AFRL Issues RFI on Advanced Battle Management System’s C2 Application Component

The Air Force Research Laboratory has asked industry to provide information on existing software platforms, applications, packages and microservices in…
Expert Panel Discusses IT Security, COVID-19 Changes, 5G During Potomac Officers Club’s Secure IT Modernization in Today’s EnvironmentNews

Expert Panel Discusses IT Security, COVID-19 Changes, 5G During Potomac Officers Club’s Secure IT Modernization in Today’s Environment

On Wednesday, Potomac Officers Club (POC) hosted its latest virtual event, Secure IT Modernization in Today’s Environment, featuring a keynote…
McAfee’s Rajiv Gupta: Agencies Should Apply Cloud-Centric Mindset to SecurityNews

McAfee’s Rajiv Gupta: Agencies Should Apply Cloud-Centric Mindset to Security

Rajiv Gupta, senior vice president of the cloud security business unit at McAfee, said implementing a cloud-centric approach to security…
SOCOM Solicits Proposals for Geospatial Analytic Support Services II ContractNews

SOCOM Solicits Proposals for Geospatial Analytic Support Services II Contract

U.S. Special Operations Command has issued a request for proposals for a follow-on contract for support services to help process,…