Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Accelerating the Kill Chain: Optimizing...
In the 21st century battlespace, it's critical that the U.S. Department of Defense ensure fast, secure and reliable networks, IT systems and communications for global warfighters across terrestrial, SATCOM, host-nation and other transport systems. For 20 years, Riverbed Technology has been at the forefront of optimizing and accelerating defense networks. As the need for greater bandwidth, reduced latency and operational fidelity has grown, so...
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
Harnessing the Power of America's Small...
America’s small businesses keep the nation’s military combat ready with critical parts, cutting-edge technology and top-notch services. They account for 43% of all high-tech jobs and generate 16 times more patents than large firms. As such, the Defense Department’s acute focus on supporting this vital segment for strong national and economic security reinforces their commitment to strengthen our domestic supply chains, increa...
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
Battlefield Bandwidth and Its Implicati...
The U.S. military has moved to an interconnected battlefield in which data can move seamlessly between air, land, maritime, space and cyber in real time. Modern battlefield networks are increasingly tasked with not only the transport of voice but also large and varied data types, including still images, video, sensor data, maps, situational awareness data and inventory information. In addition to transporting the raw data itself, these network...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.