SIGNAL Blogs

June 12, 2020
By Matthew Savare
The U.S. government procurement process is still much slower and cumbersome than the commercial sector, says Matt Savare, a partner at Lowenstein Sandler. Credit: Gerd Altmann/Pixabay

"There is simply no excuse for our antiquated, byzantine procurement process." 

May 15, 2020
By Rear Adm. Michael Brown, USN (Ret.)
End-to-end encryption will help the defense industrial base meet the requirements of the Cybersecurity Maturity Model Certification program, according to Rear Adm. Michael Brown, USN (Ret.). Credit: Jan Alexander/Pixabay

End-to-end encryption is indeed the gold standard for data security and goes a long way towards achieving the level of protection the CMMC envisions.

May 13, 2020
By Shawn Cressman
A Young AFCEAN proposes that AFCEA International create a military-style ribbon for JROTC cadets studying STEM courses to wear on their uniforms. Credit: Shawn Cressman

A Young AFCEAN proposes that AFCEA International create an AFCEA ribbon to be presented to JROTC cadets studying science, technology, engineering and mathematics.

May 4, 2020
By 1st Lt. Cory Mullikin, USA
Army soldiers check the setup up of an antenna for voice and data tactical communications in Port-au-Prince, Haiti. While the responsibilities between the Cyber and Signal branches are still evolving, a seven-layer model may be helpful in defining the divide. U.S. Navy photo by Chief Petty Officer Robert J. Fluegel

 The open systems interconnection model is a seven-layer model that allows digital products to operate and communicate with other communication devices. 

March 23, 2020
By Greg Touhill
With the Coronavirus driving more people to work or study from home, it is more important than ever for private individuals and families to secure their home networks. Credit: Manolines/Shutterstock

As people around the world practice self-isolation due to COVID-19, the need to maintain a strong cybersecurity posture arguably has never been higher.

March 17, 2020
By Pragyansmita Nayak
Government agencies do not have the analytics tools necessary to unleash data’s power, says Pragyansmita Nayak, chief scientist, Hitachi Vantara Federal. Credit: Gerd Altmann/Pixabay

Government personnel have more than enough data, but they don’t have the tools required to effectively leverage it.

March 16, 2020
By Capt. Jason Nunes
A drone operated by airmen flies over a training area at Joint Base Elmendorf-Richardson, Alaska, in October, while capturing aerial intelligence during a two-week military exercise. Software for unmanned systems goes through extensive and time-consuming testing, but machine learning could change that. Credit: Alejandro Pena, Air Force

The DOD should remove the test requirement for defense software and fully incorporate machine learning.

February 26, 2020
By Cameron Chehreh
Principles for artificial intelligence stewardship will give agencies a clear framework for promoting safe, ethical AI development in the private sector. Credit: Gerd Altmann/Pixabay

To realize the full potential of artificial intelligence, government agencies need to build on industry innovation.

February 24, 2020
By Tim Mullahy
Members of the Oklahoma National Guard drive down Telephone Road in Moore, Oklahoma, May 21, 2013, en route to the neighborhoods devastated by a tornado. Cybersecurity needs to be a priority in the aftermath of major disasters when people and their personal data can be most vulnerable. U.S. Air Force photo by Senior Airman Mark Hyber

During disasters, public sector agencies, nonprofits and emergency response organizations must all work together to protect the data of everyone involved, from volunteers to first responders to victims.

February 3, 2020
By Brandon Shopp
A U.S. Army soldier tests his battle systems in the field at Fort Polk, Louisiana. Credit: Army photo by Staff Sgt. Armando R. Limon, 3rd Brigade Combat Team, 25th Infantry Division

"While the cloud can accelerate the DOD’s efforts toward information dominance, the agency should adopt a measured approach to cloud migration."

January 14, 2020
By Kevin Gosschalk
Now that identity is the currency of the digital world and data is the fuel that powers the digital economy, digital identities are continually being compromised on multiple levels. Credit: Tashatuvango/Shutterstock

Combating digital identity fraud is a never-ending challenge.

January 6, 2020
By Wayne Lloyd
Network resilience and cyber resilience are similar but different, says Wayne Lloyd, RedSeal chief technology officer. Credit: Gerd Altmann/Pixabay

Our attack surface and complexity are only expanding as commercial, government and Defense Department networks modernize and move to the cloud and software-defined networks.

October 29, 2019
By Rod Musser
Recent events indicate the government is serious about enforcing supply chain cybersecurity. Credit: Kalabi Yau/Shutterstock

 Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.

July 24, 2019
By Steve Orrin
To reap the benefits of AI, the Defense Department must first tackle challenges with people, processes and infrastructure. Credit: Laurent T/Shutterstock

As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.

July 15, 2019
By Noah Schiffman
The National Security Agency is not to blame for the recent ransomware attack on the city of Baltimore, says Noah Schiffman, KRB chief technology adviser. Credit: Shutterstock/Stephen Finn

Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.

June 17, 2019
By Brian Wright
An agreement to share the Citizens Broadband Radio Service spectrum will benefit the U.S. Defense Department and the rest of the country. Credit: GDJ/Pixabay

The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.

March 15, 2019
By Mav Turner
Soldiers attack simulated enemy combatants during a training exercise at the Hohenfels Training Area in Germany. To meet the Army’s vision of multidomain battle, the service will need to build a battle-hardened network. Army photo by Pvt. Randy Wren

The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.

January 23, 2019
By Joe Marino
Delivering innovative technologies into the hands of warfighters requires streamlined acquisition processes. Photo by Marine Corps Lance Cpl. Drake Nickel

Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.

January 30, 2019
By Steven Boberski
The U.S. Defense Department has started to integrate unified communications into its Everything Over Internet Protocol strategy, but a wide range of computing platforms, telecommunications systems and other collaboration technologies result in a web of technologies that cannot integrate or interoperate. Credit: geralt/Pixabay

WebRTC aligns with the Defense Department’s plans for cloud computing, collaboration and adoption of more open-source platforms.

January 28, 2019
By Dave Mihelcic
When it comes to IT modernization, agencies often set their sights on adopting next-generation technology, but cybersecurity must be a priority. Credit: PIRO4D/Pixabay

Automated systems significantly reduce errors that can lead to a data breach and can increase the chance of identifying, intercepting and defeating cyber attacks in real time without increasing workloads.

Pages