TNLF East Featured

August 2012
By Rita Boland, SIGNAL Magazine


The Defense Information Systems Agency’s Host-Based Security System helps network defenders thwart threats at the device level. Enhanced capabilities and better training are rolling out to cyberpersonnel in response to new threats and technologies.

August 2012
By David J. Katz, SIGNAL Magazine

Asymmetrical warfare can be waged effectively with simple technology assets.

The United States and its allies have at their disposal an existing defense capability that can be employed as an effective weapon at the highest levels of conflict. The West’s installed base of expertise in communications electronics can be harnessed as a strategic offensive weapon to constrain nation-states that seek to bypass the overwhelming superiority that the United States and its allies possess in conventional warfare.

August 2012
By Max Cacas, SIGNAL Magazine



Government teams with the electric industry to short-circuit cyber attacks.


August 2012
By George I. Seffers, SIGNAL Magazine


WildCAT technology one day could be used to protect the wireless networks at critical infrastructure facilities, such as major U.S. ports.

A cybersecurity technology with multiple agency support prepares for fielding.

A new technology