SIGNAL Blogs

October 22, 2018
By Mike Lloyd
Artificial intelligence is still too easily fooled to secure networks without human assistance. Credit: geralt/Pixabay

Artificial intelligence is not smart enough to replace humans in cybersecurity.

October 15, 2018
By Paul Parker
Technical, physical, and departmental silos could undermine the government’s Internet of Things security efforts. Credit: methodshop/Pixabay

IoT-connected devices and apps have the potential to do some serious damage. 

October 11, 2018
By Ken Peterman
Hybrid adaptive networks combines the power of U.S. military and commercial satellite communications, maximizing warfighter capabilities and resilience. Credit: sumanley/Pixabay

We have an opportunity to develop the most advanced satellite communications system ever built.

September 24, 2018
Forces deployed around the world need the ability to transmit securely on their networks.

Military and government are benefiting from a fast and effective encryption solution.

September 11, 2018
By Paul Parker
Strip away the spin around software-defined networking, and IT administrators are left with the same basic network management processes under a different architectural framework, says Paul Parker with SolarWinds. Credit: geralt/Pixabay

Federal administrators should balance the desire for modern software-defined networking solutions with the realities of government.

September 5, 2018
By Tony Franklin
Image courtesy of Intel

Create solutions that put data to work with secure intelligence from device to cloud.

August 29, 2018
By Paul Parker
Agencies should consider taking five fundamental steps to fortify networks before the next cyber attack. Credit: Daria-Yakovleva/Pixabay

When another threat rears its head, government networks and the professionals who manage them can be better equipped to meet it head on.

August 6, 2018
By Andrew Kelleher
The NSA has had significant, and perhaps surprising, influence on the standards for destroying no-longer-needed data. Credit: PRILL/Shutterstock

 The NSA has had an unprecedented clout on commercial data security legislation and regulations.

July 11, 2018
By John Kupcinski
Cyber threat intelligence may be helpful in countering government fraud, waste and abuse. Credit: Shutterstock

The ability to harvest and analyze structured and unstructured data is essential in battling fraud, waste and abuse.

July 9, 2018
By Shaun Bierweiler
It may be a great time for government agencies to leap into open source, but looking first is always advised, says Shaun Bierweiler of Hortonworks. Credit: Sambeet/Pixabay

The time is now for government leaders to leap into open source, but they need to be cautious in their approach and definition.

July 3, 2018
By Bob Nilsson
Government network automation paves the way for artificial intelligence and machine learning. Credit: Shutterstock

Government investment in network-enhancing solutions today will help agencies leverage the benefits predicted for AI tomorrow.

June 26, 2018
By Jesse Price
As cyber attacks increase, the combination of big data capabilities and network analytics will allow network monitoring agents to shift from defense to offense. Credit: Shutterstock

Emerging optical transmission technologies are bringing change to long-haul transport networks.

 

June 20, 2018
By Jane Melia
Cybersecurity trends so far this year include a stern reminder that the threat of nation-sponsored cyber attacks cannot be ignored. Credit: TheDigitalArtist/Pixabay

The overall security attack surface continues to expand with more potential points of access for criminals to exploit, but industry is tackling the challenges head-on with numerous innovative solutions.

May 8, 2018
By Seli Agbolosu-Amison
Four policies give government agencies they flexibility and authority to limit cyber risks. Credit: katielwhite91/Pixabay

Federal agencies must develop strategies to anticipate risks and implement defensive measures to minimize cyber risks. The government now has the authority and flexibility to do that.

May 31, 2018
By Paul Parker
After enjoying a period without peers, the U.S. now find itself facing a variety of threats, including Russia, China and terrorist groups. Credit: TheDigitialArtist/Pixabay

 Technology is cheaper, faster and more widely available to enterprising bad actors.

November 9, 2017
By Tom Jenkins
Software-defined networking offers an array of network modernization benefits.

Many U.S. Defense Department networks are built on outdated legacy architecture never designed to address continually evolving threat vectors. 

November 6, 2017
By Maj. Aleyzer Mora, USA
The U.S. Army’s Home Station Mission Command Center technology refresh delivers standardized technology, multiple networking components, enhanced audio-visual capabilities and an updated physical infrastructure.

The Home Station Mission Command Center technology refresh is part of the Army’s Installation Information Infrastructure Modernization Program. 

November 6, 2017
By Joe Kim
Five basic steps can help agencies build an advanced and solid security posture.

Legacy technology is not equipped to adequately prevent attacks that are now becoming alarmingly commonplace. 

October 30, 2017
By Maria Horton
DevOps methodologies can help federal and commercial organizations offset risks without compromising their mission.

How applying the DevOps mindset and processes to digital planning address cybersecurity. 

October 27, 2017
By Davis Johnson
The President’s cyber executive order lays out a series of deadlines for federal agencies to meet.

By prioritizing network modernization, agencies bolster cybersecurity and meet the core mission requirements.

Pages