Kelsey Atherton
Stories by Kelsey Atherton
“Key task will be pursuing coalition partnerships for electromagnetic spectrum interoperability, to ensure future maneuver in EMS is not limited by non-US capability,” Moorefield said.
By Kelsey Atherton
“5G is one of the most transformative technologies coming to us, second only to the cloud,” Maj. Gen. Matt Easley says.
By Kelsey Atherton
Crucial to the promise of MORFIUS is its ability to zap many drones at once in mid-air, far from the friendly vehicles, buildings, or people actively being defended.
By Kelsey Atherton
How can Pentagon clouds process data quickly while it’s still encrypted, instead of having to decrypt it and thereby render it vulnerable?
By Kelsey Atherton
“Fundamentally, we do it the same way as noise canceling headphones; we listen to what the radio transmits and inject it in reverse in the radio, so the radio thinks that it doesn’t hear itself, and it can hear everything else” Joel Brand of Kumu Networks says.
By Kelsey Atherton
CMMC 1 is “what you’ve got to have to make sure your neighbor is not in your Netflix,” quipped Stacy Bostjanick, director of CMMC. “It’s very easy, and commensurate with basic cyber hygiene. I recommend that everyone get there, but as a COTS provider, you don’t have to.”
By Kelsey Atherton
The investment is a sign of the Air Force’s commitment to fighting war effectively across all domains, including cyber and its electronic warfare cousin.
By Kelsey Atherton
“Regardless of the JEDI Cloud litigation outcome, the Department continues to have an urgent, unmet requirement,” reads the Pentagon briefing to members of Congress.
By Kelsey Atherton
“The threat actor is revealing their hand,” said Aymn Gilani of CounterCraft
By Kelsey Atherton
How can the Army bring the Internet Of Things and ‘Smart Cities’ technology to its bases, without opening new avenues for cyber attack?
By Kelsey Atherton
The Army must link its tactical networks with its “enterprise” networks at home base, Lt. Gen. Morrison said, passing data on everything from artillery bombardments to cyber attacks.
By Kelsey Atherton
“A determined adversary with the right capabilities is going to find their way in, especially if they put all their resources to bear on it,” said Karlton Johnson, the chair of the CMMC Accreditation Body board of directors.
By Kelsey Atherton
“It should be more like an Apple Store experience,” said Lauren Knausenberger, Deputy CIO for the Air Force.
By Kelsey Atherton
Defense Enclave Services will “establish the modern infrastructure foundation and united frame of thought needed to deliver cohesive combat support capabilities to the warfighter.”
By Kelsey Atherton
“Key task will be pursuing coalition partnerships for electromagnetic spectrum interoperability, to ensure future maneuver in EMS is not limited by non-US capability,” Moorefield said.
By Kelsey Atherton“5G is one of the most transformative technologies coming to us, second only to the cloud,” Maj. Gen. Matt Easley says.
By Kelsey AthertonCrucial to the promise of MORFIUS is its ability to zap many drones at once in mid-air, far from the friendly vehicles, buildings, or people actively being defended.
By Kelsey AthertonHow can Pentagon clouds process data quickly while it’s still encrypted, instead of having to decrypt it and thereby render it vulnerable?
By Kelsey Atherton“Fundamentally, we do it the same way as noise canceling headphones; we listen to what the radio transmits and inject it in reverse in the radio, so the radio thinks that it doesn’t hear itself, and it can hear everything else” Joel Brand of Kumu Networks says.
By Kelsey AthertonCMMC 1 is “what you’ve got to have to make sure your neighbor is not in your Netflix,” quipped Stacy Bostjanick, director of CMMC. “It’s very easy, and commensurate with basic cyber hygiene. I recommend that everyone get there, but as a COTS provider, you don’t have to.”
By Kelsey AthertonThe investment is a sign of the Air Force’s commitment to fighting war effectively across all domains, including cyber and its electronic warfare cousin.
By Kelsey Atherton“Regardless of the JEDI Cloud litigation outcome, the Department continues to have an urgent, unmet requirement,” reads the Pentagon briefing to members of Congress.
By Kelsey Atherton“The threat actor is revealing their hand,” said Aymn Gilani of CounterCraft
By Kelsey AthertonHow can the Army bring the Internet Of Things and ‘Smart Cities’ technology to its bases, without opening new avenues for cyber attack?
By Kelsey AthertonThe Army must link its tactical networks with its “enterprise” networks at home base, Lt. Gen. Morrison said, passing data on everything from artillery bombardments to cyber attacks.
By Kelsey Atherton“A determined adversary with the right capabilities is going to find their way in, especially if they put all their resources to bear on it,” said Karlton Johnson, the chair of the CMMC Accreditation Body board of directors.
By Kelsey Atherton“It should be more like an Apple Store experience,” said Lauren Knausenberger, Deputy CIO for the Air Force.
By Kelsey AthertonDefense Enclave Services will “establish the modern infrastructure foundation and united frame of thought needed to deliver cohesive combat support capabilities to the warfighter.”
By Kelsey Atherton