SIGNAL Blogs

May 6, 2015
By Lewis Shepherd

Does artificial intelligence (AI) pose a threat to the human race, as many notable technologists recently have suggested? And what should be its role in the intelligence community?

May 5, 2015
By Glenn Kesselman

Personal identifiable information (PII) constantly is under threat of being compromised. One solution may be to create vaults that grant access to authorized organizations. But will it work, or even be embraced by the public?

May 4, 2015
By George I. Seffers

NATO has initiated Dynamic Mongoose, this year's biggest antisubmarine warfare exercises in the North Sea, with a focus on detecting and defending against submarines.

May 1, 2015
By George I. Seffers

Twenty companies will participate in a trade mission with Romania and Poland.

April 29, 2015
By Robert B. Dix Jr.

Proposed cybersecurity legislation is a good start, but much remains to be done to secure the nation from cyberthreats—starting with trust and cooperation among diverse organizations.

April 28, 2015
By Terry Roberts

It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.

April 28, 2015
By Maryann Lawlor

Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment. 

April 27, 2015
By M. Thomas Davis

The U.S. Defense Department now has a leader who fully grasps how technology can strengthen the defense base. Yet, bringing the military and the high-technology private sector together is not as easy as it used to be, given cultural differences.

April 27, 2015
By Robert Clark

Don't expect important cyber legislation to be sent to the president any time soon. If history is any judge, all that will emerge is a rehash of existing regulations or executive actions codified for public consumption.

April 21, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.

April 21, 2015
By Sandra Jontz

Cybersecurity has become a mission of equal importance to the Department of Homeland Security as combating terrorism, Secretary Jeh Johnson shares at the RSA Conference 2015 in California.

April 21, 2015
By Justin Marston
Virtual smartphones running commercial mobile apps from a government-hosted data center could be the future of classified mobility.

Guest blogger Justin Marston tackles the reality that is the current state of classified mobility across the U.S. government—voice and basic email. It’s not what senior leaders want, he writes. They want apps, just like everyone else, but their (justified) level of paranoia has neutered most mobile devices.

April 16, 2015
By Glenn Kesselman

Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and web browser.

April 15, 2015
By Ed Bender

Welcome to the security world, where agencies worry about cyber attacks from the outside as much as from the inside. Guest blogger Ed Bender highlights some surprising results from a recent survey in which respondents lament the insider threat; both from those who intend harm and those who inadvertently invite it.

April 15, 2015
By David E. Meadows

In December 2014, Stephen Hawking, the renowned theoretical physicist, warned the world that true artificial intelligence (AI) could mean the death of mankind. Well, that got my attention.

April 14, 2015

The Electronic Security Association, a professional trade association that represents the electronic life safety and security industry, launched a website geared at connecting people interested in careers in the security with companies that are hiring.

April 9, 2015
By Maryann Lawlor

Today more than ever before, it’s all about information. But, it turns out that Sneakers script writers only scratched the surface. 

April 8, 2015
By Al Krachman

Is the U.S. Defense Department moving back toward requiring cost and pricing data for commercial item purchases? A recent series of memoranda and experiences show a backward march toward the department requesting cost data as a means to justify fair and reasonable pricing for commercial item purchases.

April 6, 2015
By Lewis Shepherd

Guest blogger Lewis Shepherd says poll results can be surprising, especially when it comes to young people's views on the U.S. intelligence community.

March 31, 2015
By George I. Seffers

U.S. Secretary of Commerce Penny Pritzker has announced the first 26 recipients of the 2014 Regional Innovation Strategies program grants as part of a new initiative designed to advance innovation and capacity-building activities across the country.

Pages