Latest News Mentioning Red Hat

Advanced Search
Showing 1-10 of 8948

By Nancy Patel, General Manager of Commercial at Unison Effective management of contract data requirements lists, or CDRLs, is fundamental for government contractors to remain competitive. CDRLs specify the data and documentation a contractor must deliver, encompassing everything from technical manuals to progress reports. Traditionally, managing CD...

Today, the cyber and physical realms are closely intertwined, with cyberattacks having the potential to disrupt critical functions across all domains. These threats pose challenges to the U.S. Coast Guard’s mission to maintain a secure maritime environment, and the organization has recognized the need to fortify its cyber defenses. The Coast Guard...

Amazon Web Services has secured a $114.5 million contract from Army Contracting Command–Rock Island to provide cloud services at Impact Level 6 to the Army Enterprise Cloud Management Agency. A notice posted on SAM.gov states that the contract was awarded under the Joint Warfighting Cloud Capability contract vehicle to enable ECMA to provide conti...

Frank Varga, formerly chief operating officer at Apogee Engineering, has been promoted to president and CEO of the Colorado-headquartered national security and defense technology and services provider. He succeeds Wes Georges, founder of Apogee, and helps drive the growth of the company’s capability offerings for the federal and government mar...

Command and control, or C2, functions are a determining factor in battlefield dominance and a major focus area within the Army’s sweeping modernization efforts. Through a program known as Next Generation C2, the service branch aims to create an entirely new network aligning with its goal of achieving data centricity. Late last month, Army Chi...

There has been very little resistance to funding and beginning to implement the Department of Defense’s zero trust cybersecurity strategy, according to Deputy Chief Information Officer for Cybersecurity and Senior Information Security Officer David McKeown. This, however, is not as much the case with Cybersecurity Maturity Model Certification, th...

A mechanical engineer by training, Scott Aken has navigated a fascinating route to his current role as president and CEO of network intelligence provider Axellio. He began his career in the commercial sector during the dot-com boom in the late 1990s, where he worked for the sole domain name company. Cybercriminals who made attempts on...

At the 100th anniversary celebration of the U.S. Naval Research Laboratory in the fall, Navy Secretary Carlos Del Toro announced the establishment of a new enterprise: the Disruptive Capabilities Office. This endeavor is meant to reconfigure and accelerate the research-to-implementation pipeline for new technologies. And not just any technologies,...

By Kim Koster, VP of Industry Marketing at Unanet When federal spending increases, government contracting companies will naturally want to capitalize on it. But the main question you’ll need to ask yourself is this: How well positioned are we internally to identify and secure contract opportunities when they arise? Being able to answer t...