SIGNAL Executive Videos

September 21, 2021
 
SolarWinds is using a security by design methodology to strengthen its security and to help protect the software industry’s supply chain. Credit: Shutterstock

The software management firm SolarWinds is revising how it approaches security to develop better products and to help its customers and protect the supply chain they all rely on.

Cyber attacks on supply chains are a growing threat, something SolarWinds experienced in 2020 when Russian government-backed hackers breached the servers for one of the company’s software products and compromised the security of hundreds of customers including several dozen federal agencies.

Under its new CEO Sudhakar Ramakrishna, the company is changing how it operates internally and with its customers by adopting a security by design approach to its operations.

July 14, 2021
 
The Air Force is concentrating on governance, configuration management and customer focus to improve its IT networking capabilities. Credit: Shutterstock/Rawpixel.com

The U.S. Air Force’s recent IT modernization efforts are focusing on speeding up access to data across the service’s enterprise network by removing redundant and often contradictory devices and procedures to improve warfighter’s user experiences and speed operations.

Achieving this goal is the culmination of years of networking initiatives and data migration projects that transformed the way the service managed its IT operations, Douglas Dudley, director of Air Force programs for Akima LLC, told Robert K. Ackerman, SIGNAL Magazine’s editor in chief during a SIGNAL Media Executive Video interview.

August 5, 2021
 
Connecting data siloes within the Defense Department helps speed operational decision making. Credit: Shutterstock/Gorodenkoff

As technology accelerates all aspects of modern life, from business to warfare, the need for real-time situational awareness has become critical.

But several hurdles must be cleared to achieve this level of awareness, specifically the need to avoid or close any capability gaps and the ability to scale. 

“When you get to the heart of it, when we’re talking about real-time situational awareness, we are talking about mission,” David Erickson, senior director for solutions architecture at Elastic told Robert K. Ackerman, SIGNAL Magazine’s editor in chief during a SIGNAL Media Executive Video interview.

May 24, 2021
 
Cyber adversaries are creating a “wild west” environment in cyberspace where organizations must be aware of their security to protect themselves, said Gene Yoo, CEO of Resecurity Inc. Credit: Shutterstock

Recent cyber attacks against critical infrastructure such as the attack on Colonial Pipeline Co. has put cybersecurity in the spotlight.

But combating cyber adversaries is a broad area requiring significant amounts of human intelligence and a deep technical expertise to identify them, Gene Yoo, CEO of Resecurity Inc., told SIGNAL Magazine Editor-in-Chief Robert K. Ackerman during a SIGNAL Media Executive Video interview.

Adversaries come in different types, he added, noting that these range from part-time hacktivists to skilled professionals working for criminal organizations or state intelligence agencies.

May 21, 2021
 
Intel Corporation seeks out veterans because their experience and skills match the company’s core values. Credit: Shutterstock

The tech industry, with its team orientation and government contracts, is a great fit for many veterans seeking to transition to a civilian career. One company at the heart of many of today’s computing breakthroughs is Intel Corporation, which is well known for hiring people with military experience.

Several veterans shared their experiences working at Intel—what their military backgrounds helped them to do and what the company’s culture gave to them—with SIGNAL Magazine Senior Editor Kimberly Underwood for a SIGNAL Executive Video interview.

May 19, 2021
 
Cloud-based security architectures can help federal agencies protect their infrastructure and manage change as it occurs, says Sean Frazier, federal chief security officer at Okta Inc. Credit: Shutterstock

As more federal agencies and businesses move to the cloud, managing their security needs in this new environment becomes critical. One way to do this is to implement zero-trust architectures as part of an identity cloud environment, said Sean Frazier, federal chief security officer at Okta Inc.

Zero-trust architecture, where it is assumed that the network is or will be compromised, is the latest phase of security development. This is important as the Defense Department modernizes its cloud-based systems under constant pressure from foreign cyber attacks.

May 18, 2021
 
The DoD is investing heavily in the promise of high-speed edge computing with 5G technologies. Credit: Shutterstock

As the Department of Defense (DoD) transitions to 5G mobile technology for its warfighter and facility-based communications, the agency must take several considerations into account such as security and the ability to interoperate with other systems.

One of the biggest attractions of 5G is the promise of high-speed wireless data rates, but that’s just part of the picture, Chris Thomas, an information technology (IT) communications strategist and systems architect at Dell Technologies, told SIGNAL Magazine Editor in Chief Robert K. Ackerman during a SIGNAL Executive Video interview.

April 28, 2021
 
Getting privileged access management right involves making sure the right security tools are in place and determining that they are easy to use and can interoperate with legacy software and systems, says Ross Johnson, director of federal sales for Thycotic Software Ltd. Credit:Shutterstock

The recent wave of high-profile cyber attacks on federal government agencies and the businesses that support them has gotten organizations thinking about security. A key part of any organization’s security strategy is access management—determining who can access certain kinds of information and resources and when and/or where they can do so.

But determining where to start can often be delayed by indecision due to over-analysis and caution, explains Ross Johnson, director of federal sales for Thycotic Software Ltd. The first and most important thing an organization can do is to make the decision to take inventory of all their data assets.

April 20, 2021
 
Zero trust architecture isn’t a single architecture, nor is it a single solution that can be purchased, but an interrelated set of old and new technologies and methods working together, said Don Maclean, chief cybersecurity technologist for DLT Solutions.

Many federal government agencies are interested in improving their cybersecurity by moving to a zero trust architecture model. But such a move, while very beneficial to the organization, is a complex and involved process that requires some fundamental changes in how security and operations are approached, says Don Maclean, chief cybersecurity technologist for DLT Solutions.

Zero trust architecture is a cybersecurity concept that assumes a network is or will be compromised and takes steps to protect data at every potential point of access.

April 19, 2021
 
Industry can help the DOD with complex technology acquisition and deployment projects by providing services and expertise, said Dana Barnes, senior vice president of public sector at Palo Alto Networks. Credit: Shutterstock

Cybersecurity in the federal government, especially for the Department of Defense, is a complex dance between agencies and commercial partners. To get things right, companies working with the government need to be adaptable and resilient in helping government customers meet their mission goals, said Dana Barnes, senior vice president of public sector at Palo Alto Networks.

April 15, 2021
By Maryann Lawlor
The U-2 Dragon Lady is a high-altitude reconnaissance aircraft flown by the U.S. Air Force. Photo by Lockheed Martin

Revolutionary ways to gather, parse and share information in the innovation era is propelling the intelligence community into resourceful ways of doing business. To tackle the challenges lightning-speed technology changes and applications generate, 18 U.S. intelligence organizations must accept cultural changes and risk toleration to prepare for adversaries weaponizing the same capabilities against the U.S. and its allies, experts agree.

April 14, 2021
 
The DOD is concerned about the cybersecurity of additive manufacturing systems, said David Benhaim, co-founder and chief technology officer for Markforged. Credit: Shutterstock

The U.S. Department of Defense is looking at additive manufacturing technologies to rapidly prototype and build equipment components and increasingly, to potentially make replacement parts in the field.

While additive manufacturing, the ability to build plastic and metal parts by depositing a fine spray of material, has been used by the aerospace and defense sectors for some time, the capability is now becoming more portable. One such project is the U.S. Marine Corps’ X-Fab effort, which uses a shipping container loaded with compact additive manufacturing equipment that can be shipped anywhere in the world to make replacement parts.

April 13, 2021
 
Effective supply chain management with government customers requires clear communications, says Zach Conover, general manager for Akima LLC’s subsidiaries Truestone, Lynxnet and Aperture Federal. Credit: Shutterstock

The COVID-19 pandemic and the strains it put on the global supply chain is making businesses rethink how they supply their government customers, said Zach Conover, general manager for Akima LLC’s subsidiaries Truestone, Lynxnet and Aperture Federal. Akima is an Alaska native-owned government contractor providing services such as facilities maintenance and repair, information technology support, logistics and supply chain operations, and systems engineering.

January 27, 2021
 
Competing in the information domain at the national level requires data at the hyper-localized level, says Ben Leo, CEO and co-founder of Faym. Credit: Liu zishan/Shutterstock

Competition in the information domain does not happen nationally. It happens locally, said Ben Leo, CEO and co-founder of Fraym, an international open-source intelligence and data analytics company.

“Competition in the information domain simply doesn’t happen at the national level. It happens in communities, neighborhoods, and even down to individual households or homes,” Leo said during a SIGNAL Executive Video Series discussion with Robert K. Ackerman, SIGNAL Magazine’s editor in chief.