SIGNAL Blogs

March 17, 2020
By Pragyansmita Nayak
Government agencies do not have the analytics tools necessary to unleash data’s power, says Pragyansmita Nayak, chief scientist, Hitachi Vantara Federal. Credit: Gerd Altmann/Pixabay

Government personnel have more than enough data, but they don’t have the tools required to effectively leverage it.

March 16, 2020
By Capt. Jason Nunes
A drone operated by airmen flies over a training area at Joint Base Elmendorf-Richardson, Alaska, in October, while capturing aerial intelligence during a two-week military exercise. Software for unmanned systems goes through extensive and time-consuming testing, but machine learning could change that. Credit: Alejandro Pena, Air Force

The DOD should remove the test requirement for defense software and fully incorporate machine learning.

February 26, 2020
By Cameron Chehreh
Principles for artificial intelligence stewardship will give agencies a clear framework for promoting safe, ethical AI development in the private sector. Credit: Gerd Altmann/Pixabay

To realize the full potential of artificial intelligence, government agencies need to build on industry innovation.

February 24, 2020
By Tim Mullahy
Members of the Oklahoma National Guard drive down Telephone Road in Moore, Oklahoma, May 21, 2013, en route to the neighborhoods devastated by a tornado. Cybersecurity needs to be a priority in the aftermath of major disasters when people and their personal data can be most vulnerable. U.S. Air Force photo by Senior Airman Mark Hyber

During disasters, public sector agencies, nonprofits and emergency response organizations must all work together to protect the data of everyone involved, from volunteers to first responders to victims.

February 3, 2020
By Brandon Shopp
A U.S. Army soldier tests his battle systems in the field at Fort Polk, Louisiana. Credit: Army photo by Staff Sgt. Armando R. Limon, 3rd Brigade Combat Team, 25th Infantry Division

"While the cloud can accelerate the DOD’s efforts toward information dominance, the agency should adopt a measured approach to cloud migration."

January 14, 2020
By Kevin Gosschalk
Now that identity is the currency of the digital world and data is the fuel that powers the digital economy, digital identities are continually being compromised on multiple levels. Credit: Tashatuvango/Shutterstock

Combating digital identity fraud is a never-ending challenge.

January 6, 2020
By Wayne Lloyd
Network resilience and cyber resilience are similar but different, says Wayne Lloyd, RedSeal chief technology officer. Credit: Gerd Altmann/Pixabay

Our attack surface and complexity are only expanding as commercial, government and Defense Department networks modernize and move to the cloud and software-defined networks.

October 29, 2019
By Rod Musser
Recent events indicate the government is serious about enforcing supply chain cybersecurity. Credit: Kalabi Yau/Shutterstock

 Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.

July 24, 2019
By Steve Orrin
To reap the benefits of AI, the Defense Department must first tackle challenges with people, processes and infrastructure. Credit: Laurent T/Shutterstock

As the Defense Department seeks to reap the benefits of emerging artificial intelligence applications, it must first address the needed people, processes and infrastructure.

July 15, 2019
By Noah Schiffman
The National Security Agency is not to blame for the recent ransomware attack on the city of Baltimore, says Noah Schiffman, KRB chief technology adviser. Credit: Shutterstock/Stephen Finn

Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.

June 17, 2019
By Brian Wright
An agreement to share the Citizens Broadband Radio Service spectrum will benefit the U.S. Defense Department and the rest of the country. Credit: GDJ/Pixabay

The Defense Department is on the verge of benefiting from a decision to share a coveted band of radio frequency spectrum previously reserved for national security assets.

March 15, 2019
By Mav Turner
Soldiers attack simulated enemy combatants during a training exercise at the Hohenfels Training Area in Germany. To meet the Army’s vision of multidomain battle, the service will need to build a battle-hardened network. Army photo by Pvt. Randy Wren

The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to protect and defend against adversaries on all fronts.

January 23, 2019
By Joe Marino
Delivering innovative technologies into the hands of warfighters requires streamlined acquisition processes. Photo by Marine Corps Lance Cpl. Drake Nickel

Picking up the pace of acquisition reform is critical to our ability to maintain our dominance in innovative solutions for our warfighters.

January 30, 2019
By Steven Boberski
The U.S. Defense Department has started to integrate unified communications into its Everything Over Internet Protocol strategy, but a wide range of computing platforms, telecommunications systems and other collaboration technologies result in a web of technologies that cannot integrate or interoperate. Credit: geralt/Pixabay

WebRTC aligns with the Defense Department’s plans for cloud computing, collaboration and adoption of more open-source platforms.

January 28, 2019
By Dave Mihelcic
When it comes to IT modernization, agencies often set their sights on adopting next-generation technology, but cybersecurity must be a priority. Credit: PIRO4D/Pixabay

Automated systems significantly reduce errors that can lead to a data breach and can increase the chance of identifying, intercepting and defeating cyber attacks in real time without increasing workloads.

January 25, 2019
By Chris Balcik
A soldier fires an M240B machine gun during combined arms live-fire training. Soldiers in combat face a great deal of emotional and physical stress, but wearable technologies can monitor their health and performance. Photo by Army Spc. Hannah Tarkelly

Smartphones, tablets and wearable systems enable real-time analytics and data collection to ensure soldiers achieve peak health and performance on the battlefield.

December 10, 2018
By Paul Parker
The U.S. defense community is buzzing about open source containers, but the technology presents security concerns. Credit: TheDigitalArtist/Pixabay

Open source containers come with real benefits and real questions, too.

November 30, 2018
By Sean Berg
Small contractors remain cyber's weak link in the defense industrial chain. Credit: TheDigitalArtist/Pixabay

As large defense contractors invest heavily in securing their networks, adversaries turn their attention to smaller defense suppliers for cyber attacks.

October 26, 2018
By Karyn Richardson
Planning ahead can take much of the stress out of data migration. Credit: Shutterstock

Proper planning can help to alleviate many common data migration pitfalls. 

October 24, 2018
By Michael Carmack
Small and medium-sized defense contractors are increasingly targeted by malicious hackers seeking to steal intellectual property. Credit: GDJ/Pixabay

Malicious actors have put significant manpower into compromising small- and medium-sized businesses.

Pages