Fifth Domain
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Videos
  • Newsletters
  • © 2021 Sightline Media Group
  • DHS
  • FBI/DOJ
  • OMB
  • CYBERCOM
  • Air Force
  • Army
  • Marine Corps
  • Navy
  • Capitol Hill
  • Policy
  • Career
  • Education/Training
  • Opinion
  • White Papers
  • Show Reporters
  • Special Multimedia Reports
  • Insights from Raytheon

Insights from Raytheon

  • More than 800 service members and civilians gathered at Camp Atterbury for Cyber Shield 18 at Camp Atterbury, Indiana from May 2018. Cyber Shield 18 is part of the National Guard's ongoing effort to be a versatile capability for governors of all 54 states and territories. (Department of Defense photo.)
    Evolving military cyber training starts with how industry delivers software

    It's clear the U.S. Army is going to have a strong requirement for software development practices such as Agile. Agile and DevOps software methodology for the Defense Department's Persistent Cyber Training Environment.

    Don Bray
    November 20, 2018
  • A report from the the Center for Strategic and International Studies, in partnership with Raytheon, found that since the 2016 elections, 40 states have invested more than $75 million to improve election security. (Courtesy of Raytheon)
    The cyber-hardened voting booth

    A report from the the Center for Strategic and International Studies, in partnership with Raytheon, found that since the 2016 elections, 40 states have invested more than $75 million to improve election security.

    November 5, 2018
  • Raytheon is collaborating with Silicon Valley’s Pivotal to deliver defense software on timelines measured in days, not years. (nadla/Getty Images)
    Mission capability delivered at startup speed

    Raytheon is collaborating with Silicon Valley’s Pivotal to deliver defense software on timelines measured in days, not years.

    Todd Probert and Keith Salisbury
    November 1, 2018
  • A critical infrastructure attack is not likely to create wide-scale chaos, like shutting down the power grid or disrupting mass transit systems. Experts believe it would be more subtle, sowing seeds of doubt about the legitimacy of these systems. (vlastas/Getty Images)
    The three C’s of cyber

    Creativity, communication and collaboration secure critical infrastructure.

    October 30, 2018
  • Girl Scouts from Central Maryland try to find who tampered with a Girl Scouts Cookie recipe as part of a mystery challenge in the Raytheon Cyber Operations, Development and Evaluation (CODE) Center, a state-of-the-art cybersecurity range in Dulles, Virginia. The event helped to build collaborative thinking, leadership skills and cyber knowledge.
    The case of the stolen Girl Scout Cookie: Girl Scouts hone their STEM skills at Raytheon’s cybersecurity range

    A group of middle- and high-school Girl Scouts ventured into the CODE Center, Raytheon’s futuristic U.S. cybersecurity range, to solve a fictional mystery: who stole the famous Girl Scout Cookie recipe?

    October 19, 2018
  • Pfc. Nathaniel Ortiz of the 780th Military Intelligence Brigade sets up cyber tools overlooking the mock city of Razish at the National Training Center at Fort Irwin, Calif., May 5, 2017. (Photo by Bill Roche)
    What the Army needs for realistic training for cyber warriors

    It is critical that the team the Army selects to deliver its cyber training environment has experience in large-scale integration of complex systems, system engineering and rapid development capabilities, as well as a deep understanding of the operational context.

    Don Bray
    October 10, 2018
  • U.S. Army soldiers assigned to the 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, monitor the network at Lightning Ops, the Theater Network Operations Center for Exercise Saber Guardian 17, in June 2017 in Romania. (U.S. Army)
    The Army is working toward a cyber domain doctrine

    Cyber demands rules of engagement and concepts of operations just like those that exist for the other domains, and the Army is leading the way to establish the needed doctrine.

    October 2, 2018
  • In this April 1972 photo made available by NASA, John Young salutes the U.S. flag at the Descartes landing site on the moon during the first Apollo 16 extravehicular activity. NASA says the astronaut, who walked on the moon and later commanded the first space shuttle flight, died on Friday, Jan. 5, 2018. He was 87. (Charles M. Duke Jr./NASA via AP)
    Launching the cybersecurity moonshot

    The United States is reliant on digitally-connected technologies that are fundamental to our national security, public safety, and economic prosperity. Our nation’s ability to protect and enhance the cybersecurity is a national imperative.

    John DeSimone
    September 14, 2018
  • From simple mistakes to cyber sabotage, insiders pose risks to networks

    To combat insider threat, experts say the best defense is to understand the people who use the network rather than trying to thwart every new hacking technique that comes along.

    August 15, 2018
  • Since the inception of Black Hat in 1997, researchers have used to conference to expose weaknesses in mobile devices, connected vehicles, the electronic locks on your hotel room – even the local ATM. (Raytheon)
    Don’t get pwned at Black Hat

    Here are tips on how to stay safe at this year's Black Hat cybersecurity conference.

    Mark Orlando
    August 7, 2018
  • Raytheon brought an array of capabilities to SOFEX and the Middle East that will help fight terrorism in a high-tech world, including its cyber academy that efficiently trains students to detect and fight cyber attacks. (Photo courtesy of Raytheon)
    Cybersecurity 101: First class graduates from new Raytheon academy

    Raytheon is offering specialized training academies around the world to strengthen private organizations and government agencies against cyberattacks.

    July 23, 2018
  • U.S. Marine Corps MV-22B Osprey aircraft attached to Marine Aviation Weapons and Tactics Squadron One prepare to conduct an aerial refuel during a Long Range Raid simulation in conjunction with Weapons and Tactics Instructor Course 2-18 in Tuscon, Arizona, April 11, 2018. (Sgt. David Bickel/Marine Corps)
    For military, readiness means software updates, cyber safeguards

    Rebuilding the military's readiness means a lot of new code.

    July 23, 2018
  • Airman 1st Class Theodore Banta, 5th Communications Squadron client systems technician, troubleshoots a network issue with a customer at Minot Air Force Base, North Dakota, April 24, 2018. (Senior Airman Jonathan McElderry / U.S. Air Force)
    Developing defense capabilities at the speed of software

    To help transform the Defense software acquisition model, parts of the Defense Department — most especially the Air Force and DIUx — are working with the traditional aerospace and defense industry as well as smaller Silicon Valley companies on pilot programs that take advantage of modern, commercial software processes.

    Todd Probert
    July 23, 2018
Quick Links
Newsletters CyberCon
Whitepapers E-Books
Sign up for our Daily Brief
Get the top Cyber headlines in your inbox every weekday morning.
Enter a valid email address
Enter a valid email address
Thanks for signing up!
For more newsletters click here
  • Newsletters
  • Contact Us
  • facebook icon
  • twitter icon
  • linkedin icon
  • https://www.fifthdomain.com © 2021 Sightline Media Group
    Not A U.S. Government Publication
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
Terms of Use
  • Terms of Service
  • Privacy Policy
Get Us
  • Newsletters & Alerts
  • RSS Feed
Contact Us
  • Help & Contact Info
  • Advertise
About Us
  • About Us
  • Careers
Military News
Air Force News
Army News
Marine Corps News
Navy News
Defense News
Federal News
C4ISR
Cyber
History