SIGNAL Blogs

September 18, 2014
By Robert K. Ackerman

The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.

September 18, 2014
By Robert K. Ackerman

The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.

September 18, 2014
By Robert K. Ackerman

The U.S. intelligence community had a good read on the unfolding events in Ukraine and with ISIL in Syria and Iraq. However, even the community's prescience has its limits.

September 18, 2014
By Robert K. Ackerman

Snowden and Manning have done serious damage to U.S. intelligence capabilities, and adversaries are adjusting their activities in response.

September 18, 2014
By Robert K. Ackerman

Cyber intelligence sharing must change its nature as well as expand its reach.

September 18, 2014
By Robert K. Ackerman

Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.

September 18, 2014
By Robert K. Ackerman

Food, water, disease and energy increasingly are becoming disruptive to global security. Accordingly, they are moving up the intelligence priority list.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.

September 18, 2014
By Robert K. Ackerman

The first U.S. national intelligence strategy in five years is released exclusively in unclassified form.

September 18, 2014
By Robert K. Ackerman

Demands for "immaculate collection" of intelligence data are putting U.S. national security at risk.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.

September 17, 2014
By Rita Boland

The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.

September 17, 2014
By Rita Boland

Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).

September 17, 2014
By Rita Boland

Confyrm, GSMA and MorphoTrust win contracts from NSTIC to secure identities better.

September 16, 2014
By Rita Boland

Frank Abagnale, whose now-famous criminal exploits during his early years led him to an adulthood protecting the public, explained today what concerns him in terms of security and why people, not technology, need to be the biggest concern.

September 16, 2014
By Rita Boland

Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways.

September 16, 2014
By Rita Boland

People often don’t know who has their information, how those groups are using it or even if it’s correct.

September 16, 2014
By Rachel Lilly

Driving somewhere unfamiliar and in need of a gas station? Starving but not sure which restaurants are nearby? The free AroundMe app for iOS and Android identifies your location and shows you a complete list of nearby businesses in the category you select.

September 16, 2014
By Rita Boland

The FBI’s Next Generation Identification system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy.

September 15, 2014
By Maryann Lawlor

The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.

Pages