Mobile data traffic generated by cellphones and tablets will approach almost 197,000 petabytes by 2019, according to Juniper Research.
On the same day that news headlines implicated Russian hackers in a significant cyber attack and breach on the White House, officials attending a cybersecurity summit Tuesday in the nation’s capital warned of the uptick in the number of nation state-sponsored cyber attacks against the U.S. government and businesses.
With the information world marching en masse to the cloud, one global firm is offering direct peer-to-peer encryption to reduce the threat of an intervening cyber intercept. This approach is applicable to dedicated hardware as well as to commercial off-the-shelf consumer communications equipment, and its operation is relatively transparent to the user.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
"There’s an app for that" is truer than ever these days. As BYOD and BYOA increasingly infiltrate government agencies, public sector information technology departments must consider the impact these apps and devices have on their own environments. Chris LaPoint explains why agencies need to focus on applications, not devices, as the key to enabling a mobile work force.
The National Institute of Standards and Technology (NIST) is preparing recommendations to help organizations leverage the benefits of mobile apps while managing their risks.
The widespread use of mobile devices on the battlefield, which may have seemed an improbability just a few years ago, may become an actuality within the next few. A recently released strategy document supports that pending reality, which is expected to increase situational awareness, improve operational effectiveness and enhance the operational advantage for U.S. forces.
A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community.
U.K. government entities at various levels are looking into bring-your-own-device policies for their purposes. And while their mandates differ, they all have one factor in common—a need for the right level of security.
The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.
Do you love listening to podcasts? The new Overcast app, developed by Marco Arment, co-founder of Tumblr and creator of Instapaper, offers a simple, intuitive interface to listen to all your favorites.
It’s traditional for journalists to end an interview with some version of the question, “What would you like to add?” On the surface, it is the softest of softball questions, but for one interview, it led to headline news.
The Marine Corps Warfighting Lab wraps up experiments testing multiple systems, including robots, radios and ship-to-shore transporters in Hawaii.
The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.
Have you ever walked into a business meeting and wished you could know a bit about each person attending to spark real conversation and bypass the typical small talk? The free Refresh app for iOS provides a quick overview of the people you're about to meet, aggregating information from across the Web.
The complexities of the U.S. Army’s networks and spectrum allocation processes interfere with the need to reassign units to different tasks, creating major delays and presenting serious challenges.
The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.
A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.