Ensuring that deployed U.S. troops can communicate and exchange information is critical to the military’s missions. That said, there are numerous challenges in deploying the high-speed tactical networks that make this communication possible. How, for example, do you make sure these networks are available when needed? What is the best way to maintain data integrity? The accuracy of the data—such as troop location—is just as important as network availability.
The SIGNAL Blog
Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative, a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented. The bad news is that .1 percent—or 30,000 attacks—successfully compromised a DOD cyber system.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
Engineers from Sandia National Laboratories are conducting the largest model-scale wave energy testing of its kind to harness power from one of the biggest untapped clean energy sources on Earth—and one of the hardest to capture.
Federal, state and local law enforcement authorities are becoming more sophisticated about cyber attacks and devoting more resources to responding to them.
Katie Helwig, director of small business programs at AFCEA International, attended this week's Washington Technology Health and Human Services Industry Day and came away with some insights.
Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. It takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.
Naval Information Forces has developed a website for the Navy Cyber IT and Cybersecurity Workforce (Cyber IT/CSWF) Qualification Program.
Aqua Comms Ltd. announced the successful completion of a trial of Cinea’s WaveLogic 3 Extreme transmission technology on American Europe Connect, its high-capacity, transatlantic subsea cable network that connects New York to London.
Smaller businesses have become bigger targets for cyber attacks. Now more than ever, owners must quantify the risk and what could happen as a result of a successful cyber breach.