AI for ATO: Pentagon seeks AI to streamline cumbersome cybersecurity processes
“Like Frank’s Red Hot Sauce, we should be trying to put AI on anything that you can,” said David McKeown, a senior cybersecurity official.
More results...
“Like Frank’s Red Hot Sauce, we should be trying to put AI on anything that you can,” said David McKeown, a senior cybersecurity official.
Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is made up of…
America’s AI Action Plan features 19 recommendations that involve the DoD, including the creation of a “virtual proving ground.”
Bell will now proceed in DARPA’s Speed and Runway Independent Technologies program, which has eliminated Aurora Flight Sciences from the running.
“The number of companies that we’re announcing is a surprise to me,” program manager Joe Altepeter told Breaking Defense. “I did not expect we would get this many.”
“We’ve been flying a prototype for quite some time,” said Steve Parker, Boeing’s interim defense unit CEO. “And we won the program. So that is a maturity stamp that I’ll give you right then and there.”
Produced by SERCO through the research agency’s NOMARS program, the ship has been named Defiant (USX-1).
Quantum tech could provide high-precision alternatives to GPS for targeting or sonar for hunting submarines. But the same hyper-sensitivity that makes them such good sensors also makes them fatally vulnerable to interference – so far. A new DARPA progr…
In March, DARPA will add multiple companies to its Quantum Benchmarking Initiative, program manager Joe Altepeter told Breaking Defense. “A year from now we’ll know a lot more about if this industry is for real or not.”
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024, we want to introduce Buttercup, our AIxCC submission. Buttercup is a Cyber Reasoning System (CRS) that combines conventional cybersecurity techniques like fuzzing and static analysis with AI and machine learning to find and fix software vulnerabilities. The system is designed to operate […]