The Subcommittee on Military Personnel oversees DoD policy, programs, and accounts that affect the well-being of service members and their families.| Breaking Defense
The Pentagon’s new policy lets commanders overrule separation boards, limiting transgender troops’ ability to stay in the military.| TransVitae
USSF Colonel (Ret) Kalliroi Landry joins Iridium as Government Programs Director MCLEAN, VA., October 14, 2024 – Iridium Communications Inc. (Nasdaq: IRDM) today announced that U.S. Space Force Colonel ...| Iridium Satellite Communications
When it comes to embracing advanced artificial intelligence (AI) applications and solutions, government agencies face a hard truth: building from scratch often creates more problems than it solves. The idea of a fully customized system is appealing – something designed for specific mission needs with total control over how it’s built. But in practice, this […] The post Three Key Benefits of Full Lifecycle COTS AI Platforms for Government Agencies appeared first on Go...| Government Technology Insider
Two cornerstone authorities for federal contracting quietly expired on September 30, 2025, creating ripple effects that contractors—small and large—cannot afford to overlook. The Small Business Innovation Research/Small Business Technology Transfer (“SBIR/STTR”) programs, commonly known as “America’s Seed Fund” for their role in fueling early-stage innovation, and the Defense Production Act (“DPA”), the backbone of the... Continue Reading…| Inside Government Contracts
The Biden Pentagon funded horrific Frankenstein-style experiments that use body parts from aborted babies, and we’re still paying for it. A new investigation by the government watchdog White Coat Waste (WCW) has revealed that the Department of War (DOW) is still funding millions in grants handed out by the Biden administration for sick experiments that […] The post EXCLUSIVE: Biden-Era Pentagon Grants Still Spending Tax Dollars On Gruesome Animal Tests With Aborted Human Fetal Tissue appe...| Loomered
Keith’s note: The Department of Defense War is now cracking down on journalists who wish to commit acts of actual journalism at DOD DOW. Since NASA’s role has now been formally redefined by Executive Order 14343 as having “a primary function intelligence, counterintelligence, investigative, or national security work” what can we expect in terms of how NASA PAO (Public Affairs Office) interacts with media? This may be a stretch – […] The post NASA PAO 2.0? appeared first on NASA Wa...| TrumpSpace Archives - NASA Watch
Today, the Department of Defense (DoD) published the final Cybersecurity Maturity Model Certification (CMMC) rule. This is a major step toward strengthening cybersecurity across the defense industrial base (DIB). This rule, now part of the Defense Federal Acquisition Regulation Supplement (DFARS), outlines mandatory cybersecurity requirements for contractors and subcontractors handling Controlled Unclassified Information (CUI) and […] The post DoD Publishes Final CMMC Rule appeared first ...| Whistleblower Law Collaborative
This blog post discusses the Department of Defense’s (“DoD”) new cybersecurity rule that imposes certain cybersecurity requirements on relevant DoD contractors and subcontractors. The post will be of interest to all DoD contractors, subcontractors, and possibly affiliates of contractors that may be impacted by the new rule’s cybersecurity requirements. On September 10, 2025, DoD published... Continue Reading…| Inside Government Contracts
Get answers to all the questions Dept. of Defense (DoD) contractors are asking about current CMMC certification requirements.| I.S. Partners
The post Why DevSecOps Must Include Data Security—and How Sertainty is Making It Happen appeared first on Sertainty.| Sertainty
Bills introduced in Congress would force the Department of Defense to stop releasing “forever chemicals” into surrounding areas| CityView NC
The world of government information continues to be in a state of topsy-turviness. Last month, on a Tuesday, NOAA suddenly announced that on the following Monday, the Defense Meteorological Satellite Program (DMSP) and Navy’s Fleet Numerical Meteorology and Oceanography Center (FNMOC) would “discontinue ingest, processing and distribution of all DMSP data no later than June […] The post Once-cancelled hurricane-monitoring data to stay online (for now) first appeared on Free Government I...| Free Government Information (FGI)
Mark Gorak discusses DOD’s efforts to build a diverse cyber workforce, including skills-based hiring and partnerships with over 480 schools.| GovCIO Media & Research
TL;DR Want to help editing a collaborative version of Definition Of Done checklist, driven by questions, rationales and “don’ts”? Click here and feel free to share your ideas! Long Some months ago my team and I had to define a Definition of Done for one of our projects. Each item of DoD should be an … Continue reading The Definition of Definition of Done→| Arialdo Martini
Property of the People published documents last week revealing that less than two months before Charlottesville’s deadly “Unite the Right” white nationalist rally, the U.S. Army’s Threat Integration Center (ARTIC) developed and disseminated intelligence reports highlighting the threat purportedly posed by anti-fascist activists while simultaneously whitewashing and downplaying the menace posed by racist, far-right “ANTI-ANTIFA” groups. […]| Property of the People
Today, on the 100th anniversary of Mandela’s birth, Property of the People is making all documents it has obtained on Nelson Mandela available to the public.| Property of the People
"Sell? We're having too much fun." So says Future Tech chief Peter Cappiello, as his private 5G firm claims mad sales growth, and new deals with Ericsson, Dell, and Intel.| RCR Wireless News
New system from GigaIO delivers AI compute power in a portable form, designed for edge deployments in defense, sports, media, energy, and industrial sectors.| RCR Wireless News
The US DoD has appointed Federated Wireless, sub-contracting JMA and HPE, on a $6m deal to deploy its first private 5G network for the US Marine Corps.| RCR Wireless News
Threat Actors like the Typhoon Crews from China, are using simple techniques to penetrate networks. Do not ignore.| SENKI
Ongoing sightings of mysterious drones in the skies over New Jersey have sparked alarm among residents as officials continue to investigate the odd nightly incursions.| The Debrief
Do you have a customer whose printer ports are open and vulnerable and can now be used for DDoS? Is your network’s “Internet Print Protocol” (IPP) port open and ready for exploitation? Last week, the Shadowserver Foundation alerted a “large increase in queries on 631/UDP seen in our sensors due to recent CUPS RCEs disclosure. Read More| SENKI
No, most ASEAN countries are not ready for “serious cybersecurity.” Cybersecurity requires a persistent and consistent rhythm of action that fixes known security risks. Public benefit—non-profit cyber civil defense organizations like the Shadowserver Foundation, CyberGreen, and other organizations deliver actionable cyber-risk reporting as a public benefit. Yes, these reports are free to organizations seeking to Read More| SENKI
The French Government sees the massive number of PlugX infections as a national threat. PlugX is malware used by Nation State threat actors to get inside networks. Sekoia was part of a sinkholing action that uncovered thousands of locations where PlugX is deployed. Should you be concerned? How do you discover if you have a Read More| SENKI
If you follow the May 10, 2024, Black Basta “critical action” recommendations, you will most likely be exposed and potentially exploited by the threat actors. Read through the #StopRansomware: Black Basta AA-24-131A and HS-ISAC Black Basta Threat Actor Emerges as a Major Threat to the Healthcare Industry. Then take a step back and mitigate/remediate the Read More| SENKI
Key points from the 2018 industry consultation on our anti-DDoS strategy. This is the trust peer community who daily battles DDoS.| SENKI
Leverage Shadowserver's Cyber Civil Defence reporting to protect your network from risk.| SENKI