Radar & Electronic Warfare
September 2017

View our archive of past issues of the CyberDefense Report E-newsletter.


Feature: Industry Spotlight

Establishing a root of trust: Trusted computing and Intel-based systems

In the global defense-electronics market there is a growing demand for trusted computing solutions that carry effective protections against cyberattacks. Users want to be confident that when they power up their deployed embedded system, the code that their system is running can be trusted. In this sense,”trusted” means that the system is running only the [...]

Continue Reading →
nts-1-heading

nts-1-title

nts-1-blurb

Continue Reading →
Intel Xeon D: A Significant Leap Forward in General Purpose Processor (GPP) Technology Across the Spectrum of Defense Application.
Download this whitepaper to read more.
Industry News

U.S. Cyber Command's status is raised to form a unified combatant command

WASHINGTON. Department of Defense (DoD) officials initiated the process to elevate the U.S. Cyber Command to a unified combatant command. The decision, at the direction of the President, is consistent with Title 10 of U.S. Code, section 167b, and the recommendation of the Secretary of Defense.

Continue Reading →
Industry News

Study: Open-source intelligence assets growing in U.S., abroad

The results of the market study revealed that rapid advances in big data, data analytics, text analytics, and artificial intelligence are facilitating the conversion of millions of scattered data points into manageable databases that intelligence analysts are then able to use. Moreover, the report found that an increasing amount of personal data, corporate content, and [...]

Continue Reading →
How to Reduce Size, Weight and Power of Satellite Command and Telemetry Subsystems
Today there are nearly 1,400 satellites in orbit with functions ranging from surveillance and imaging to television and voice communications. Download this whitepaper to read more.
Industry News

Researchers discover burstiness and strong memory combination in cyber intrusions

ADELPHI, Md. U.S Army Research Laboratory (ARL) researchers discovered that the process of intrusion detection in computer networks exhibits a significant degree of burstiness as well as strong memory.

Continue Reading →
Industry News

DoD official: We will deploy advanced algorithms to front lines to decode data before year-end

Speaking at a recent media event, Cukor said that by the end of 2017, the DoD will place advanced computer algorithms onto government platforms to extract objects from the huge amounts of imagery that is being captured in the field: “People and computers will work symbiotically to increase the ability of weapon systems to detect [...]

Continue Reading →
Cybersecurity Update

DoD embraces bug bounty programs in push to get ahead of cybersecurity vulnerabilities

Officials at the Department of Defense (DoD) recently initiated several seemingly unorthodox programs in its multi-year campaign to secure their networks from adversaries. To date, the “Hack the Pentagon,” “Hack the Army,” and “Hack the Air Force” bounty programs have yielded over 450 valid vulnerabilities among them. The Air Force’s Chief Information Office is sponsoring [...]

Continue Reading →
Industry News

CACI obtains $51 million task order to develop software for Air Force cyber operations

Under the terms of the contract, CACI will continue to provide software development and operational support for the Air, Space, and Cyberspace Constructive Environment – Information Operations Simulation (ACE-IOS) suite of models, tools, and utilities the Air Force uses for computer-assisted exercises. CACI will also provide technical and architecture support to the 90th COS Cyber Simulation [...]

Continue Reading →
Industry News

ViaSat to provide cybersecurity software to keep mobile devices secure

CARLSBAD, Calif. ViaSat Inc. officials announced it was awarded a production contract to provide ViaSat Mobile Dynamic Defense (MDD) cybersecurity software to protect and secure Tactical Local Area Network (TACLAN) Field Computing Device - Wearable (FCD-W) platforms.

Continue Reading →
Industry News

Navy signs agreement with Purdue University to develop cybersecure energy storage systems

WASHINGTON. Purdue University officials entered into a new cooperative research and development agreement (CRADA) with Naval Surface Warfare Center, Crane Division (NSWC Crane) with the aim to develop the next generation of high capacity, safe, reliable, and cybersecure energy storage systems.

Continue Reading →
Cybersecurity Update

The power of light: A shortcut to satellite-based quantum encryption

Researchers in Germany have demonstrated ground-based measurements of quantum states sent by laser aboard a satellite 38,000 kilometers above Earth, suggesting that satellite-based quantum encryption may be within reach by as soon as five years.

Continue Reading →
Industry News

SparkCognition to develop AI decision-making technology for USAF, DoD

Through DIUx, the U.S. Air Force (USAF) will work with SparkCognition to leverage machine learning and similar methodologies to analyze and reveal latent relationships within data resident across the USAF, and apply these toward its planning, programming, budgeting, and execution (PPBE) process; the PPBE process is the DoD’s resource-allocation mechanism. Using data from the USAF, [...]

Continue Reading →
Guest Blog

Coding standards — are they necessary?

To address the need for improved safety and security, consistency and to simplify future maintenance and testing, software development organizations must consider standardizing on a process for software development and a well-defined use of the software language. If this environment is not well defined, there are of course huge potential problems further down the line. [...]

Continue Reading →


Using default time zone: America/New_York

Visit our Facebook
Visit our LinkedIn
Visit our Twitter

Not already a subscriber to CyberDefense Report? Click here to subscribe. 
Questions? Comments? Want to publish your content? Contact the editor.

Click here to view this email as an HTML page.
Last updated: Thu, 21 Sep 2017 01:18:50 +0000


©2016 OpenSystems Media, LLC.
Thank you for reading this issue of CyberDefense Report,
subject: "".

Please add subscriptions@news.militaryembedded.com to your address book to help ensure our emails reach your inbox.