Category: Customer

UK MoD Progress in Combating Cyber Attacks

Over the next four years it is envisaged that whole new career structures in Defence will be developed to support this work, and to recognise the growing importance of cyberspace to the future of...

AgustaWestland Competes for USAF Programs

AgustaWestland Competes for USAF Programs

The U.S. Air Force has announced it is moving forward with a competition for the Common Vertical Lift Support Platform and HH-60 recapitalization programs and AgustaWestland North America is prepared to participate and  compete...

FEMA’s International Programs and Activities

FEMA’s International Programs and Activities

See also in https://www.aofs.org/hs-bilateral-agreements-us/ the text of some HS bilateral agreements. Asia Pacific Economic Cooperation (APEC): FEMA supports the Department of State and other U.S. departments and agencies’ engagement in APEC’s Emergency Preparedness Working Group...

Cyber Breach May Have Exposed DoD Networks

Cyber Breach May Have Exposed DoD Networks

Some Pentagon computer networks might have been laid open to intruders as a result of a recent electronic break-in at one of the nation’s most prominent cybersecurity firms. Earlier this month, RSA announced that...

New Pentagon Cyber Strategy Complete: Official

New Pentagon Cyber Strategy Complete: Official

The Pentagon is finalizing a new cyber warfighting strategy that will create a framework for training and equipping forces, as well as call for more international cooperation in this evolving domain, according to a...

Cyber Command Pursues ‘Defensible’ IT Architecture

Cyber Command Pursues ‘Defensible’ IT Architecture

Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command, including development of a “defensible architecture” that’s better suited for the latest generation of cyber...

Cyberwarfare advances

Cyberwarfare advances

The commander of the new U.S. Cyber Command told Congress on Wednesday that threats of cyberwar continue to grow. “The cyberthreat continues to mature, posing dangers that far exceed the 2008 breach of our...