1. cageymaru

    Department of Defense Seeks American Foundries for Cutting Edge Process Nodes

    Policy makers at the Department of Defense (DoD) are concerned with the current American landscape of innovative DMEA-accredited Trusted Foundries partners. The US government would prefer that sensitive chips for military applications be created here in America. IBM was entrusted to perform...
  2. cageymaru

    Cybersecurity Vulnerabilites in Weapon Systems Blemish the Department of Defense

    A study by the U.S. Government Accountability Office (GAO) has shown how vulnerable U.S. weapon systems under the control of the Department of Defense (DOD) have become. This is due to the weapon systems becoming more networked and software dependent and the DoD is still in the early stages of...
  3. cageymaru

    Department of Defense Is Funding Bone Conduction Research for Communications

    The Molar Mic by Sonitus Technology is a new communications device that allows wearers to speak without an external device on the head and hear using bone conduction. The microphone clips onto the back of your teeth and makes speech during natural disasters and other extremely noisy events much...
  4. DooKey

    The Defense Department has Produced the First Tools for Catching Deepfakes

    The DoD has developed the first forensic tools to detect deepfakes. The new tools use AI to detect the deepfakes that are usually created with AI or machine learning tools. One key discovery that helps make detection easier is that most deepfakes use still images of people and then overlay the...
  5. cageymaru

    The Department of Defense Begins Taking Proposals for $10 Billion JEDI Cloud Contract

    The Department of Defense (DoD) has begun taking proposals for the JEDI Cloud contract. These proposals will be evaluated and a single cloud provider will be awarded a $10 billion contract to provide secure cloud services for the DoD. The contract will be competitively awarded but Amazon Web...
  6. DooKey

    Uncle Sam to Strap Body Sensors to Hackers in Nuke Lab Security Study

    The US Department of Defense is funding research into how hackers hack, with an interesting twist. It wants to wire them up with body monitoring equipment to measure how they react while hunting down and exploiting security flaws. I'm not really sure this will give the US any real insight into...
  7. DooKey

    Mil-spec Infosec Spinout Cryptonite Reveals its Network-Scrambling Tech

    Security startup Cryptonite dropped out of stealth late last week with a micro-segmentation-based technology designed to prevent hacker reconnaissance and lateral movement. Their new appliance, CryptoniteNXT, works by obfuscating network topology. The appliance changes a static network into a...