The bad practices are aimed especially at — though not limited to — educating critical infrastructure owners and operators. This includes, of course, the defense industrial base and many who support its supply chain — from communications equipment and high-tech capabilities to electrical and mechanical components for military hardware, such as tanks, planes, and ships.
By Brad D. Williams“We don’t have a parochial view, thinking that because [a cyber incident] happened over there [in that industry], it can’t happen here [in the space industry],” AIAA’s Lee says.
By Brad D. WilliamsThe F-35 aside, the report recommends that the Air Force “resist future participation in any joint aircraft procurement or development programs.”
By Theresa HitchensThe combined company will offer a wide range of unmanned vehicles (mostly small ones) for air, land, sea, and underwater, said exec Roger Wells.
By Sydney J. Freedberg Jr.Operational technologies, or OT, are prevalent in critical infrastructure environments. “Without direct action to harden OT networks and control systems against vulnerabilities… owners and operators will remain at indefensible levels of risk,” NSA says.
By Brad D. WilliamsOshkosh, the incumbent, makes military trucks by the thousand. GM Defense, the upstart, has little recent military experience — but is backed by one of the world’s biggest auto companies.
By Sydney J. Freedberg Jr.Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.
By Brad D. WilliamsThe US has a narrow edge in its talent pool, its hardware and its algorithms, but China is ahead in accumulating data, deploying applications, and integrating different functions.
By Sydney J. Freedberg Jr.The new owners bring venture capital and software expertise to upgrade Area-I’s ALTIUS mini-drone, already a favorite in Army experiments with ‘Air-Launched Effects.’
By Sydney J. Freedberg Jr.“I don’t want to get into any specifics,” Mike White told me, “but some of the challenges we’ve had so far getting to flight have been, in certain instances, avoidable.”
By Sydney J. Freedberg Jr.“We dealt with this in the 5G debate and to me it wasn’t just a matter of Huawei and ZTE technology allowing [China] to spy on people around the world,” Rep. Mike Gallagher said. “It was them being able to use that dominant market position in 5G in order to either shut down networks or coerce other countries into doing their bidding.”
By Paul McLeary
Instead of throwing subsidies around indiscriminately, the authors argue, the US government needs to invest only in crucial new technologies while crafting policy incentives to shift industry behavior.
By Bryan Clark and Dan Patt