SIGNAL Blogs

June 3, 2015
By Glenn Kesselman

If individuals or organizations are not pursuing even the most basic cyber hygiene measures, then they may need a cyber concierge to set them straight.

June 1, 2015
By George I. Seffers

A NATO coalition of scientists and researchers recently experimented with a variety of underwater robots in a joint scientific mine countermeasures sea trial.

June 1, 2015

Insight Public Sector Inc., Tempe, Arizona, is being awarded $30,934,596 for call MU01 against a previously awarded blanket purchase agreement (N66001-15-A-0001) to procure Microsoft brand name enterprise licenses and support, known as software assurance. The company also is being awarded $18,401,694 for call MU02 under the same contract. The Marine Corps Systems Command, Quantico, Virginia, is the contracting activity.

 

May 29, 2015
By Robert B. Dix Jr.

The U.S. government has been developing a national cyber response plan for nearly seven years. It's time the deliberation ended and a final version emerged to guide the nation through any potential cyber contingency.

May 28, 2015
By Terry Roberts

The advanced skill sets of intelligence and cyber professionals now are applicable across the spectrum of the business world. Government risks losing this valuable group of people unless it changes its ways.

May 27, 2015
By Allan L. Mink

The national capital region may receive its own joint information environment, or JIE. It would generate many advantages for its users, but some others might suffer from the new environment.

May 27, 2015
By Sandra Jontz
Sentinel-1 satellite

The annual Copernicus Masters competition seeks participants to submit ideas, applications and business concepts using Earth observation data that could lead to significant changes to the status quo in a number of fields. The international competition, with a deadline of July 13, offers cash prizes and support valued at more than 300,000 euros.

May 26, 2015
By M. Thomas Davis

When it comes to the Budget Control Act and the sequestration cuts associated with it, is it the right response, but the wrong target?

May 22, 2015
By Bill Nolte

The Department of Homeland Security has endured growing pains as a result of its rapid creation, but it also can chalk up significant accomplishments.

May 21, 2015
By George I. Seffers
DHS S&T has awarded two Innovation Prizes to companies offering solutions for first responders.

The Department of Homeland Security’s Science and Technology (S&T) Directorate today announced the winners of S&T’s first innovation prize competition: The Vreeland Institute Inc., Copake, New York., and Certa Cito LLC, Rochester, New York.

May 19, 2015
By Sandra Jontz

Engineers from several government agencies and industry partners have teamed up to explore solutions to better predict, and thus mitigate, adverse impacts solar storms have on power grids.

May 19, 2015
By David E. Meadows

As the Internet of Things takes shape, it will generate a new phenomenon—the Complexity of Things.

May 19, 2015

Mobile data traffic generated by cellphones and tablets will approach almost 197,000 petabytes by 2019, according to Juniper Research.

May 18, 2015
By Tim McMillan

Humans continue to be the weakest link in cybersecurity, but they also could become its strongest asset.

May 14, 2015
By Sandra Jontz
A bomb disposal robot removes a suspicious package during a training operation at Sandia National Laboratories. (Photo by Randy Montoya), A robot performs a rescue operation on a dummy victim during a training exercise at a previous Robot Rodeo. (Photo by Randy Montoya)

Giddy up! Military and civilian bomb squad operators are taking to a capabilities exercise robot rodeo to showcase proficiencies and uses of robotics in the field. For the first time in nearly a decade, organizers included unmanned aerial vehicles in the competition.

May 13, 2015
By Maryann Lawlor

It all began with Dolly, the first animal to be cloned from an adult somatic cell. While technical advances continued to make the news, their effects and the possibilities they created did not reach lawmakers or the legal profession.

May 12, 2015
By George I. Seffers

A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.

May 11, 2015
By Dr. Wesley Kaplow

The Internet of Things (IoT) and big data may combine to generate the greatest cyberthreat of all.

May 8, 2015
By Al Krachman

Contract protests can be the fault of government, contractors or the process itself. For government, it may be something as simple as lack of understanding on the part of contracting authorities.

May 7, 2015
By Sandra Jontz
Intel Security's World Password Day website

If the confession of evil works is the beginning of good works, as Saint Augustine is quoted as saying, today might prove quite cathartic. It’s World Password Day!

Pages