The Reality of Tactical Communications

Tactical Edge Communications ISR Drone

After 20 years of holding communicative superiority at the tactical edge over adversaries, the United States has relied on certain methods that will not be available in the next fight.

Secure Conferencing Beyond Mass-Market Software

Secure Voice Conferencing with REDCOM Conference Manager and SIGMA

The global pandemic has forced workers and executives across industries to transition to remote work. Many organizations need more than commercially available conferencing tools to keep their conversations secure.

What is the Army’s Network Integration Technology Enhancement (NITE) Program?

5GTI increment 1 or NITE

Overview of NITE (formerly called 5GTI/Inc1) NITE is an acronym for Network Integration Technology Enhancement and was formerly known as 5GTI (5th Generation Technical Insertion) Increment One. While NITE represents an essential development for the state of the Army’s tactical communications stack, it is only an element of increment one of four of the Army’s […]

Mitigation of Insider Threat Begins and Ends with Security Culture

Two of the largest data breaches in recent United States history were carried out by malicious insiders. Improving security culture by becoming proficient in the basics of security and promoting its importance within our working communities is the first and most important step toward mitigating insider threat.

Code of Honor: The Navajo Code Talkers in WWII

Marine Navajo Code Talkers at sea

The Navajo Code Talkers were an elite group of men that were sent to Marine divisions stationed in the Pacific. During the first 48 hours of the Battle of Iwo Jima, they coded over 600 transmissions with impeccable accuracy and speed unmatched by coding machines.

Code of Honor: Navajo Code Talkers on Iwo Jima

USMC “Navajo Code Talkers” Preston and Frank Toledo

Throughout the battle of Iwo Jima during WWII, Marines were able to openly send and receive encoded messages by radio or by tactical telephone thanks to the efforts of the “Navajo Code Talkers”. Were it not for the Navajos, the Marines would never have taken Iwo Jima.

How REDCOM Secures the Mission Part 4: Ease of Use

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on ease of use.

How REDCOM Secures the Mission Part 3: Interoperability

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on interoperability.

How REDCOM Secures the Mission Part 2: Resiliency

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Here we address REDCOM’s stance on overall mission security, which necessitates a strong focus on resiliency.