"Mobile Armour" for Smartphones, Crowdsourcing Military Debugging with Games, and More

Here is today’s federal cybersecurity and  information technology news:

  • The Defense Advanced Research Projects Agency and the U.S. Army Research Laboratory have awarded Invincea a contract to expand their Mobile Armour mobile device security project. More here.
  • The Library of Congress has issued a request for information on a mobile application for Federal Library procurement. More here.
  • The Army has put a stop-work order on the  A160 Hummingbird helicopter drone equipped with the Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System. More here.
  • The Department of Homeland Security plans to provide federal agencies with free computer threat-detection packages in 2013. More here.
  • Senators introduced the the Data Security and Breach Notification Act of 2012 which would require organizations to inform compromised users of a breach as quickly as possible. More here.
  • Two British LulzSec hackers plead guilty of attacking CIA and law enforcement networks. More here.
  • The Defense Advanced Research Projects Agency is funding research into games that would crowdsource checking militraty systems for software and security bugs as part of their Crowd Sourced Formal Verification program. More here.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.