Command and Control (C2) at the Tactical Edge

In the context of military operations, command and control (C2) at the tactical edge governs the ability to communicate and respond to threats. In this post, REDCOM looks at a couple of challenges that face our military’s ability to maintain C2 in future engagements at the tactical edge.
Cybersecurity Tips and Tricks for Working from Home

The ease of being able to connect to work at any time day or night from home, and have everything you need in your living room office poses the question, is my network safe? As part of Cybersecurity Awareness Month, here are some top tips to make sure you and your network are staying protected.
TAA: Why It Matters When Buying Communications Products

The integrity of communications gear is more important now than ever before. When government agencies, militaries, and first responders deploy mission-critical communications solutions, lives are on the line. Understanding where this technology was sourced and built is critical to our security as a nation. REDCOM products meet TAA compliance because REDCOM designs, develops, and manufactures all of our products at our headquarters in the United States.
Defining Advanced Persistent Threats (APT)

Microsoft announced it has detected numerous cyberattacks targeting the 2020 U.S. election. As an exercise, REDCOM looked into a widely accepted definition of APT and reviews two well-known APT groups to explore the factors that lead to their classification and how they operate.
Celebrating the 75th Anniversary of V-J Day

V-J Day, the end of the war with Japan, heralded the end of World War II. American radio announced the news of the Japanese surrender at 7:00PM EST, sparking wild celebrations around the nation.
Zero-Knowledge Proofs and their Impact on Cyber Security

A Zero-Knowledge Proof (ZKP) is a protocol that verifies whether certain knowledge exists without revealing it. The only information verified by a ZKP is that the proving party knows the secret. The verifying party does not learn what the secret is and cannot obtain or reconstruct the secret in any form. In a world of password-based authentication and digital privacy, this could be a game-changer to modern cybersecurity.
Hypothetical Cyber Attack – Exploiting WEA

WEA is the system responsible for driving critical announcements to all available LTE devices in a target area. As an exercise, REDCOM looked at its vulnerabilities and how it can be manipulated by nefarious actors.
Communications Challenges in DIL Environments

Every commander must have a plan for what happens in disconnected, intermittent, limited (DIL) environments. What does the solution look like and what are the drawbacks of the current design?
Communications for Humanitarian Aid

In the wake of a natural disaster, having effective communications for humanitarian aid is critical to rapid and efficient response, and the key to success.
Co-Op Feature with Conor Ahern

REDCOM routinely has co-op and internship opportunities available for college students that want to earn real-world experience at a technology company. Our engineering department finds it particularly important to bring these young engineers into the mix for their new perspectives and ideas. At REDCOM, co-op students collaborate directly with our product development teams and are often involved in truly meaningful projects.