The SIGNAL Blog

Monitoring Tactical Wi-Fi Networks

By Joe Kim

Ensuring that deployed U.S. troops can communicate and exchange information is critical to the military’s missions. That said, there are numerous challenges in deploying the high-speed tactical networks that make this communication possible. How, for example, do you make sure these networks are available when needed? What is the best way to maintain data integrity? The accuracy of the data—such as troop location—is just as important as network availability.

5 Tools for Recognizing and Combating Cybercrime

October 17, 2016
By Aubrey Merchant-Dest

Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative, a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented. The bad news is that .1 percent—or 30,000 attacks—successfully compromised a DOD cyber system.

U.S. Army Cyber Command Gets a New Commander

October 14, 2016
By Sandra Jontz
E-mail About the Author

Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.

Surfing USA in the Name of Science

October 17, 2016
By Julianne Simpson

Engineers from Sandia National Laboratories are conducting the largest model-scale wave energy testing of its kind to harness power from one of the biggest untapped clean energy sources on Earth—and one of the hardest to capture.

How to Report Cyber Crime

October 12, 2016
By Julianne Simpson

Federal, state and local law enforcement authorities are becoming more sophisticated about cyber attacks and devoting more resources to responding to them.

5 Tips for Creating a Cybersecurity Culture Within DOD Environments

October 11, 2016
By Aubrey Merchant-Dest



Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. It takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.

Hackers Love Your Small Business

October 5, 2016
By Julianne Simpson

Smaller businesses have become bigger targets for cyber attacks. Now more than ever, owners must quantify the risk and what could happen as a result of a successful cyber breach.

Pages