Sponsor Blog

October 13, 2021
 

There is a lot of information available about zero trust—at times inconsistent and unreliable. Talk to different vendors and you are likely to get different answers as to exactly what zero trust is and how to adopt it within your agency.

What you need to know is this:

October 8, 2021
 

Control room ergonomics are a matter of health and safety and an issue of efficiency and overall productivity.

Well-designed control room balance fits the demands of the job to the capability of the operators. An important aspect of any successful ergonomic control room upgrade is the console. Acting as a central nervous system, the console in any control room connects the operator to the technology, with significant impact on ergonomics.

The cost vs. benefits of incorporating an ergonomically designed console in a control room is analyzed from regulatory compliance, health and safety, and operator efficiency.

Regulatory Compliance

September 1, 2021
By Rob Sobers

Ransomware is a form of malicious software that infiltrates a computer or network and limits or restricts access to critical data by encrypting files until a ransom is paid.

Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry, affecting everything from financial institutions to higher education. Due to the rise in remote work prompted by the pandemic, attacks are up 148%.

August 11, 2021
By Richard Breakiron, Director, Strategic Initiatives, Commvault

What comes to mind when you think of simplicity? Something that is readily apparent and understandable with little additional guidance? A simple algorithm or a simple mathematical solution? Or rather a simple solution to all problems? When we think of simplicity, we think of Edsger Dijkstra’s words: “Simplicity is the prerequisite for reliability.” Essentially, we’re talking about a solution that is simple, reliable, secure, and that meets all ends at any given stage in a single complicated journey.

July 30, 2021
By Frank Puranik

“No Comms, No Bombs” is the mantra of Military Signals Divisions (Brigades or Corps), and they’re right: Communications is an integral part of any Army, Navy, Air or Space Force.

Luckily the reverse: Comms => Bombs, is not true and comms go far further in the modern military than providing time and location information for bombing. No Comms also means no search and rescue, no logistics support, no tactical awareness, ...

Examples of communications go:

August 1, 2021
By Jessica Van Horn

Did you know, in 2020, there were a staggering 36 billion records exposed as a result of data breaches, according to a recent report from Risk Based Security? COVID-19 was of course the catalyst for these infringements, as the pandemic gravely impacted industries all over the globe and opened the door for cyber criminals to attack.

August 1, 2021
By Kevin Keeney and Michael Young

By design, the DoD Data Strategy compels transformational change in the way data is collected, analyzed and leveraged. The mechanics may be different depending on domain or joint all-domain mission, but as referenced in a previous SIGNAL special interest editorial, the strategy’s endgame is to ensure that trusted information gets to the right destination at the right time. As the largest and oldest service at the tactical terrestrial layer of the joint force, the Army has enduring data imperatives: speed, scale and resilience. Executed diligently, these imperatives facilitate an information advantage for ground forces in garrison and in theater.

August 1, 2021
By Shaun Waterman

Connectivity is at the heart of today’s modern military operations. To conduct complex, distributed multidomain operations at speed and scale, U.S. and allied forces need seamless connectivity to enable real-time communications and high-fidelity data flows.

But the military services have wrestled for decades with the challenge of communicating and sharing data securely with each other, let alone with non-DoD partners and allies. To take a few examples:

August 1, 2021
By Shaun Waterman

To maintain America’s advantage over potential adversaries, the Department of Defense last year outlined a data strategy directing that military leaders must “recognize that data is a strategic asset that must be operationalized in order to provide a lethal and effective Joint Force that, combined with our network of allies and partners, sustains American influence and advances shared security and prosperity.”

August 1, 2021
By Shaun Waterman

“Decision dominance … is the ability for a commander to sense, understand, decide, act and assess faster and more effectively than any adversary,” Army Futures Command Commander Gen. John “Mike” Murray, USA, told the Association of the U.S. Army Global Force Next virtual conference in March.

In modern warfare, against near-peer adversaries, victory will no longer be guaranteed by strength of arms alone. Speed and accuracy of decision making will be more critical than ever, and in many circumstances, decisive.

August 1, 2021
By Henry S. Kenyon

Cyber attacks present an increasing threat to the United States across all sectors of government and commercial industry, from the battlefield to the factory floor, requiring a strong, holistic approach to cyber defense through active monitoring and modeling techniques.

Recent attacks, such as the Russian-backed espionage operation that compromised a server at software developer SolarWinds Inc., affecting its downstream customers—including half a dozen federal agencies—and the recent ransomware attack on Colonial Pipeline Company, which halted fuel shipments to much of the U.S. East Coast for over a week, represent a grave threat to national security.

August 1, 2021
By Danelle Barrett and Jeremy Grant

This scenario is all too common of late: A service man teleworks from home, supporting his command’s logistics and connected to his government network via a Common Access Card (CAC). While the pandemic abates across the United States, he and many in the workforce will continue telecommuting as governments have committed significant resources toward cloud-based services and cybersecurity solutions for accessing cloud data.

A Zero Trust approach is imperative in a world where data and users are not co-located within the same perimeter, as indicated by the May 12 White House Executive Order #14028. Deploying strong authentication upfront as a foundation when building out a Zero Trust strategy is also key to successful missions.

July 15, 2021
Interview by Mark Senell
Credit: Shutterstock/Olivier Le Moal

The digital transformation is no longer simply an enabler—it’s the “trunk of the tree” that provides the foundational structure for everything we do, according to Gen. Stanley A. McChrystal, USA (Ret.). “It shapes what we are and how we operate.”

June 10, 2021
By Wolfgang Richter

Across the globe, ministries of defense are continually challenged with meeting the demands of armed forces who need access to the right intelligence products to protect citizens, defend borders and support humanitarian missions.

While the need for rapid decision-making has never been greater, decision makers often lack the timely information required to inform their choices. In dynamic military environments, situations and plans change quickly and intelligence can become outdated. The problem becomes even more complex during joint and multinational operations.

June 21, 2021
 
A U.S. Army soldier provides security during the Advanced Battle Management System (ABMS) exercise at Nellis Air Force Base, Nevada, Sept. 3, 2020. Staged at multiple military sites, ABMS simulated an attack on the national infrastructure testing the U.S. Department of Defense’s Joint All Domain Command and Control (JADC2) which allowed for a fast-coordinated response.  U.S. Air Force photo by Airman 1st Class Dwane R. Young

The next-generation battlefield has gone digital. The United States Air Force (USAF) is taking a major defensive leap into that new reality with its Advanced Battle Management System (ABMS) initiative.

June 14, 2021
 
Credit: ZinetroN/Shutterstock

A delayed focus on IT modernization could create a gap between frequent high-impact cyber breaches and the U.S. Department of the Navy’s preparedness to address them. From the SolarWinds hack to ransomware, new cyber threats emerge almost weekly. Advances in technology to help defend against such threats occur so quickly that current acquisition and infrastructure programs cannot keep pace.

December 23, 2020
By Harvey Boulter
Shutterstock/Thitichaya Yajampa

Experts have issued fresh warnings to U.S. citizens over the enormous amount of sensitive, personal information being routinely captured and commoditized, and that this same information is being weaponized by the country’s adversaries. A panel at the recent AFCEA TechNet Cyber conference highlighted that data gathering by Facebook, WhatsApp and Google presents a significant risk to both individuals and the nation.

October 27, 2020
 

Information management is an integral part of any military operation, and in today’s operations, technology is a common tool used to facilitate a shared understanding of intel. A growing trend for military bases is to install large format direct-view LED video walls in locations like command centers, control rooms and briefing rooms to show an integrated big picture of data feeds and video feeds critical to decision-making during the mission. As global cyber threats increase and the Department of Defense ramps up expectations for cybersecurity, the manufacturing location for any technology systems which send and receive signals is a forefront concern for equipment installations for the military and government.

July 9, 2020
By John McDonald, Sales Director, Federal DOD, CommScope

As the Department of Defense (DOD) continues its digital transformation efforts with systems upgrades and emerging technology, it needs to consider the foundational piece—the network infrastructure. Network infrastructure—including fiber and copper cabling, antennas, wireless access points and switches—is the backbone for all current and future devices that run on the network.

April 29, 2020
By Chris Collura, VP Federal Sales at CommScope
Credit: Shutterstock/Fit Ztudio

There’s no question that 2020 is going to be a big year for technology transformation in the Defense Department. The National Defense Authorization Act gives DoD a $738 billion budget – a $20 billion increase over last year – with an emphasis on fielding the technology necessary for a faster, more agile force, while improving operations and efficiency across the enterprise. That means having fast, low-latency cellular and Wi-Fi connections at every access point and refreshing its legacy infrastructure.

September 25, 2018
By Tony Franklin
Image courtesy of Intel

Artificial Intelligence (AI) and Machine Learning (ML). Unprecedented insight generated at the edge and in the data center. Hardened, comprehensive end-to-end security. These are just a few of the technology possibilities and requirements driving public sector transformation forward.

At Intel, we’re focused on accelerating innovation and insight, with secure edge-to-cloud solutions, throughout the public sector.

How are we doing this? It starts by taking a wholistic approach to the opportunities and challenges within the public sector.

September 5, 2018
By Tony Franklin
Image courtesy of Intel

As edge technologies continue to get smarter, faster, and more connected, incredible opportunities have emerged for the public sector to accelerate time to value and reduce costs. These mission-specific solutions are also simpler and faster to deploy!

November 17, 2014
By Jay Aceto

This blog is written by our sponsor Teradata Corporation. Views expressed do not necessarily reflect the views of AFCEA International or SIGNAL Media.

Many of us have heard the phrase “defense-in-depth” as it relates to cybersecurity, and most would agree that it’s not working. The strategy of cyber defense-in-depth was developed to defend against dynamic or real-world attacks aimed at strategic Defense Department (DOD) and intelligence community assets by creating layers of network and other technical defenses that require the attacker to expend a large amount of time, money or sophistication to gain access.

September 11, 2014
 

This article is written by our sponsor Riverbed. Views expressed do not necessarily reflect view of AFCEA International or SIGNAL Media.

There is an enormous opportunity in the Defense Department information technology to streamline operations, reduce costs and increase security. Two enabling policies from the Federal CIO are Cloud First and Shared First.

Riverbed provides actionable advice for tackling a low-risk, high return-on-investment (ROI) cloud project.

Today’s Status Quo

August 25, 2014
 

This article is written by our sponsor Riverbed Federal. Views expressed do not necessarily reflect views of AFCEA International or SIGNAL Media.

Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, director of technology strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs by coordinating their investments in network and security monitoring.