SIGNAL Blogs

July 17, 2015
By Justin Marston

Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs. 

July 15, 2015
By Davis Johnson

In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.

July 15, 2015
By Sandra Jontz

Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.

July 14, 2015

The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.

July 14, 2015
Maryann Lawlor

The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...

July 13, 2015
By Dr. Wesley Kaplow

The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.

July 9, 2015
By David E. Meadows

Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.

July 2, 2015
By Robert Clark

Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?

July 1, 2015
By Robert B. Dix Jr.

At a time when the U.S. critical infrastructure is at its most vulnerable point, the Department of Homeland Security is moving away from cooperation and coordination with the private sector.

June 30, 2015
By George I. Seffers

The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

June 29, 2015
By Terry Roberts

The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.

June 23, 2015
By Bill Nolte

The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.

June 19, 2015
By Sandra Jontz

NIST published today its final guidelines for federal agencies to use when they provide unclassified but sensitive information to nonfederal workers, such as contractors or universities that work with the government.

June 18, 2015
By George I. Seffers

On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.

June 18, 2015

AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.

June 17, 2015
By George I. Seffers
Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, kicked off the second day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, during which military officials highlighted the importance of command and control in defending cyberspace.

Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.

June 16, 2015
By George I. Seffers
Lt. Gen. Ronnie Hawkins Jr., USAF, director, Defense Information Systems Agency (DISA), releases an updated strategic plan for the agency., Industry panelists discuss how to "Secure, Operate and Defend in the Commercial Sector."

Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.

June 19, 2015
By Robert Clark

Too many experts who are weighing in on the debate of when to consider a cyber attack an act of war are not experts at all. A nation's leadership must respond carefully using existing international guidelines.

June 16, 2015
By M. Thomas Davis

The U.S. defense industrial base seems to be going out with a whimper. Only four companies now crack the list of the top 100 U.S. firms based on revenue, and this unwelcome development has occurred against a backdrop of global instability and change.

June 11, 2015
By David E. Meadows

The Information Age is on the brink of a new revolution as quantum mechanics begins to influence its developments. But, uncertainty reigns when it comes to predicting what will emerge and how it will affect the world.

Pages