What is the Army’s Network Integration Technology Enhancement (NITE) Program?

5GTI increment 1 or NITE

Overview of NITE (formerly called 5GTI/Inc1) NITE is an acronym for Network Integration Technology Enhancement and was formerly known as 5GTI (5th Generation Technical Insertion) Increment One. While NITE represents an essential development for the state of the Army’s tactical communications stack, it is only an element of increment one of four of the Army’s […]

Mitigation of Insider Threat Begins and Ends with Security Culture

Two of the largest data breaches in recent United States history were carried out by malicious insiders. Improving security culture by becoming proficient in the basics of security and promoting its importance within our working communities is the first and most important step toward mitigating insider threat.

Code of Honor: The Navajo Code Talkers in WWII

Marine Navajo Code Talkers at sea

The Navajo Code Talkers were an elite group of men that were sent to Marine divisions stationed in the Pacific. During the first 48 hours of the Battle of Iwo Jima, they coded over 600 transmissions with impeccable accuracy and speed unmatched by coding machines.

Code of Honor: Navajo Code Talkers on Iwo Jima

USMC “Navajo Code Talkers” Preston and Frank Toledo

Throughout the battle of Iwo Jima during WWII, Marines were able to openly send and receive encoded messages by radio or by tactical telephone thanks to the efforts of the “Navajo Code Talkers”. Were it not for the Navajos, the Marines would never have taken Iwo Jima.

How REDCOM Secures the Mission Part 4: Ease of Use

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on ease of use.

How REDCOM Secures the Mission Part 3: Interoperability

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on interoperability.

How REDCOM Secures the Mission Part 2: Resiliency

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on resiliency.

How REDCOM Secures the Mission Part 1: Technology

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption.

Russia’s Large, Unique Presence in the Landscape of Cyber Warfare

In current American discourse surrounding cybersecurity, we are often confronted with the idea of the Russian adversary. Whether it be botnets, malware attacks, network intrusions, or general disinformation, many are quick to pin malicious cyber activity on Russian operators. Following our 2016 presidential election, Russia’s influence in this realm became apparent, even to those not well-versed in cyber-threat analysis. Before this though, experts have known not only of Russia’s deep involvement in cyber-warfare, but also of the peculiar geopolitics that put Russia in a unique position within the international cyber-landscape.