SIGNAL Blogs

October 29, 2019
By Rod Musser
Recent events indicate the government is serious about enforcing supply chain cybersecurity. Credit: Kalabi Yau/Shutterstock

 Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.

July 24, 2019
By Steve Orrin
To reap the benefits of AI, the Defense Department must first tackle challenges with people, processes and infrastructure. Credit: Laurent T/Shutterstock

As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.

July 15, 2019
By Noah Schiffman
The National Security Agency is not to blame for the recent ransomware attack on the city of Baltimore, says Noah Schiffman, KRB chief technology adviser. Credit: Shutterstock/Stephen Finn

Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.

June 17, 2019
By Brian Wright
An agreement to share the Citizens Broadband Radio Service spectrum will benefit the U.S. Defense Department and the rest of the country. Credit: GDJ/Pixabay

The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.

March 15, 2019
By Mav Turner
Soldiers attack simulated enemy combatants during a training exercise at the Hohenfels Training Area in Germany. To meet the Army’s vision of multidomain battle, the service will need to build a battle-hardened network. Army photo by Pvt. Randy Wren

The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.

January 23, 2019
By Joe Marino
Delivering innovative technologies into the hands of warfighters requires streamlined acquisition processes. Photo by Marine Corps Lance Cpl. Drake Nickel

Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.

January 30, 2019
By Steven Boberski
The U.S. Defense Department has started to integrate unified communications into its Everything Over Internet Protocol strategy, but a wide range of computing platforms, telecommunications systems and other collaboration technologies result in a web of technologies that cannot integrate or interoperate. Credit: geralt/Pixabay

WebRTC aligns with the Defense Department’s plans for cloud computing, collaboration and adoption of more open-source platforms.

January 28, 2019
By Dave Mihelcic
When it comes to IT modernization, agencies often set their sights on adopting next-generation technology, but cybersecurity must be a priority. Credit: PIRO4D/Pixabay

Automated systems significantly reduce errors that can lead to a data breach and can increase the chance of identifying, intercepting and defeating cyber attacks in real time without increasing workloads.

January 25, 2019
By Chris Balcik
A soldier fires an M240B machine gun during combined arms live-fire training. Soldiers in combat face a great deal of emotional and physical stress, but wearable technologies can monitor their health and performance. Photo by Army Spc. Hannah Tarkelly

Smartphones, tablets and wearable systems enable real-time analytics and data collection to ensure soldiers achieve peak health and performance on the battlefield.

December 10, 2018
By Paul Parker
The U.S. defense community is buzzing about open source containers, but the technology presents security concerns. Credit: TheDigitalArtist/Pixabay

Open source containers come with real benefits and real questions, too.

November 30, 2018
By Sean Berg
Small contractors remain cyber's weak link in the defense industrial chain. Credit: TheDigitalArtist/Pixabay

As large defense contractors invest heavily in securing their networks, adversaries turn their attention to smaller defense suppliers for cyber attacks.

October 26, 2018
By Karyn Richardson
Planning ahead can take much of the stress out of data migration. Credit: Shutterstock

Proper planning can help to alleviate many common data migration pitfalls. 

October 24, 2018
By Michael Carmack
Small and medium-sized defense contractors are increasingly targeted by malicious hackers seeking to steal intellectual property. Credit: GDJ/Pixabay

Malicious actors have put significant manpower into compromising small- and medium-sized businesses.

October 22, 2018
By Mike Lloyd
Artificial intelligence is still too easily fooled to secure networks without human assistance. Credit: geralt/Pixabay

Artificial intelligence is not smart enough to replace humans in cybersecurity.

October 15, 2018
By Paul Parker
Technical, physical, and departmental silos could undermine the government’s Internet of Things security efforts. Credit: methodshop/Pixabay

IoT-connected devices and apps have the potential to do some serious damage. 

October 11, 2018
By Ken Peterman
Hybrid adaptive networks combines the power of U.S. military and commercial satellite communications, maximizing warfighter capabilities and resilience. Credit: sumanley/Pixabay

We have an opportunity to develop the most advanced satellite communications system ever built.

September 24, 2018
Forces deployed around the world need the ability to transmit securely on their networks.

Military and government are benefiting from a fast and effective encryption solution.

September 11, 2018
By Paul Parker
Strip away the spin around software-defined networking, and IT administrators are left with the same basic network management processes under a different architectural framework, says Paul Parker with SolarWinds. Credit: geralt/Pixabay

Federal administrators should balance the desire for modern software-defined networking solutions with the realities of government.

September 5, 2018
By Tony Franklin
Image courtesy of Intel

Create solutions that put data to work with secure intelligence from device to cloud.

August 29, 2018
By Paul Parker
Agencies should consider taking five fundamental steps to fortify networks before the next cyber attack. Credit: Daria-Yakovleva/Pixabay

When another threat rears its head, government networks and the professionals who manage them can be better equipped to meet it head on.

Pages