Table of Contents: July 2015
Destructive Cyber Attacks Increase in Frequency, Sophistication
RAT infestations are just one serious threat to critical infrastructure.
Automation Aids Cybersecurity for Financial Sector
Software shares threat data faster and more efficiently.
An Ounce of Cyberthreat Protection
New tools provide critical warning to guard against a growing number of costly network attacks.
Quantum Radar Could Render Stealth Aircraft Obsolete
New technology may benefit military and medicine.
PTT Technology Goes to Smartphone App
An upgrade offers a new level of interoperability for push-to-talk.
DISA Seeks Software Solution To Manage Spectrum
The search is on for automated tools to improve the effectiveness of this finite resource
Simplicity, Security and Reliability From Mobile Satellite Providers Benefit Government
Instead of magnifying technological problems, companies should minimize them for customers with complex missions.
Understanding Digital and Cyber Topography Is Critical to Successful Military Operations
Nontechnical personnel must be able to conceptualize the digital demons the Signal Corps faces.
Building a Capability Development Work Force for the Cyber Age
Greater agility, flexibility and imagination will help field capabilities to meet the "speed of need."
Creepy-Crawlies Aid Biometric Forensics
Human body microbes create a metaphorical fingerprint.
Keeping an Aging Fleet Flying
DISRUPTIVE BY DESIGN
The Real Dangers of Trojans Are Not What You Think
Cooperation Shapes NITEC 2015
AFCEA EDUCATIONAL ACTIVITIES
Academic Awards Recognize Excellence, Promote Achievement
The Great Wall of Sand