What is the Army’s Network Integration Technology Enhancement (NITE) Program?
Overview of NITE (formerly called 5GTI/Inc1) NITE is an acronym for Network Integration Technology Enhancement and was formerly known as 5GTI (5th Generation Technical Insertion) Increment One. While NITE represents an essential development for the state of the Army’s tactical communications stack, it is only an element of increment one of four of the Army’s […]
Mitigation of Insider Threat Begins and Ends with Security Culture
Two of the largest data breaches in recent United States history were carried out by malicious insiders. Improving security culture by becoming proficient in the basics of security and promoting its importance within our working communities is the first and most important step toward mitigating insider threat.
Code of Honor: The Navajo Code Talkers in WWII
The Navajo Code Talkers were an elite group of men that were sent to Marine divisions stationed in the Pacific. During the first 48 hours of the Battle of Iwo Jima, they coded over 600 transmissions with impeccable accuracy and speed unmatched by coding machines.
Code of Honor: Navajo Code Talkers on Iwo Jima
Throughout the battle of Iwo Jima during WWII, Marines were able to openly send and receive encoded messages by radio or by tactical telephone thanks to the efforts of the “Navajo Code Talkers”. Were it not for the Navajos, the Marines would never have taken Iwo Jima.
How REDCOM Secures the Mission Part 4: Ease of Use
REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on ease of use.
How REDCOM Secures the Mission Part 3: Interoperability
REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on interoperability.
How REDCOM Secures the Mission Part 2: Resiliency
REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on resiliency.
Response to: Catastrophic disasters could hit millions of Americans in the coming years. What can the Army do?
A recent article published in the ArmyTimes highlights the requirements of the Army and Army entities in the aftermath of domestic catastrophic incidents but fails to touch on the importance of re-establishing communications.
How REDCOM Secures the Mission Part 1: Technology
REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption.
Russia’s Large, Unique Presence in the Landscape of Cyber Warfare
In current American discourse surrounding cybersecurity, we are often confronted with the idea of the Russian adversary. Whether it be botnets, malware attacks, network intrusions, or general disinformation, many are quick to pin malicious cyber activity on Russian operators. Following our 2016 presidential election, Russia’s influence in this realm became apparent, even to those not well-versed in cyber-threat analysis. Before this though, experts have known not only of Russia’s deep involvement in cyber-warfare, but also of the peculiar geopolitics that put Russia in a unique position within the international cyber-landscape.