On Feb. 3, 2206 the Senate Armed Services Committee held a hearing on "strategic competition in an unconstrained, post-New START Treaty environment." ...
The Feb, 3, 2026 Congressional Research Service "In Focus" report discusses agentic artificial intelligence and cyberattacks.
The House has voted 217-214 to narrowly pass a $1.2 trillion federal appropriations package that includes about $839 billion for defense and ends a partial government shutdown. In final tally, 21 ...
After Congress allocated nearly $25 billion to the Coast Guard through reconciliation funding last summer, the service is still working to obligate the money while operations in U.S. Southern Command ...
Several companies selected -- including Ascent, Auterion, ModalAI, Neros Technologies, Teal Drones and PDW -- already have systems on the Pentagon’s list of policy-compliant pre-vetted drones.
The INSIDER is a daily news digest from Inside Defense. Every business day, the INSIDER delivers news and notes on the Defense Department, Congress and the defense industry. And every day, we send you ...
The Air Force named Brig. Gen. Jason Voorheis as the new portfolio acquisition executive for Command, Control, Communications and Battle Management, according to an announcement yesterday.
As DRPM or “Sub Czar,” Gaucher will report directly to Deputy Defense Secretary Steve Feinberg and wield broad authority over submarine acquisitions during a four-year term. The Navy has struggled to ...
Solutions should be able to detect, track and support engagement with intercontinental ballistic missiles or hypersonic glide vehicles during multiple flight phases. They should be able to also ...
The “virtual open house” will take place March 26 at 2 p.m. EDT. Registration closes March 23. Along with information on priorities, the event will include discussions from the program executive ...
Pentagon chief technology officer Emil Michael has named the individuals tapped to lead efforts under the Defense Department's six critical technology areas.
The National Security Agency details activities for military services and defense agencies to achieve "target-level," zero-trust architecture implementation at the preparation and integration phases, ...