When is the network not really the network?

DISA is moving forward with the idea of using remote browser technologies to provide isolation between DoD networks and the Internet. While this cyber strategy won’t eliminate the risk altogether, the new architecture will increase security posture.
Evaluating Encryption Schemes for Use in Secure Multi-Party VoIP Conferencing

REDCOM Research Assistant Collin Sweeney has authored a provoking white paper on different encryption schemes for secure, multi-party VoIP conferencing products. He addresses the current failure of the market to secure, real-time, n-party VoIP teleconferencing for private and commercial use. Interested in learning more? Download the white paper!
Quantum Computing and Secure Voice Encryption

As new advancements are beginning to allow quantum computers to approach market-readiness, cybersecurity professionals are beginning to address their security frameworks and the potential for post-quantum resistant encryption schemes.
An Introduction to Cryptography and the Public Key Infrastructure

REDCOM Sales Engineer Mike Gates wrote a great primer on how cryptography works. For anyone curious about the fundamentals, this is a quick and worthwhile read.