Navy aircraft carrier strike groups will get the new technology in 2022, about 18 months sooner than previously planned.
A cyberattack that may have compromised information about current and former NASA employees is only the latest sign of ongoing information security problems that have plagued the agency for years.
The satellite industry has so far managed to avoid a high-profile cyber attack, something experts attribute both to the industry’s vigilance and how oblivious much of the world is to the magnitude of the services it provides.
Electronic threats against satellite communication have rapidly escalated in the last few years and will continue to advance in the foreseeable future.
An audit by the Defense Department’s inspector general office found security cracks in the supply chain of four critical military space programs.
Small satellites that have propulsion systems, but don’t have encrypted commanding systems, pose a small but real threat of being hacked and endangering other satellites, according to a new study.
The National Oceanic and Atmospheric Administration’s Commercial Remote Sensing Regulatory Affairs office plans to roll out a tiered approach to evaluating company data-protection plans.
For cybersecurity experts, it’s clearcut: smallsat operators should take the same precautions as large satellite operators, including encrypting uplinks and downlinks, safeguarding ground stations and monitoring network activity.
Air Force Space Command is being relieved of the responsibility of fighting hackers in cyberspace. The job now belongs to Air Combat Command.
Parsons will be pursuing more Air Force and NASA work, especially in small satellite prototyping and engineering development.
When the nonprofit Space Foundation began devoting the first day of its annual Space Symposium to cybersecurity in 2010, the forum was unclassified. In recent years, however, the event has been restricted to U.S. citizens with Top Secret/Sensitive Compartmented Information or code-word clearance.
In spite of all the safeguards, companies must continually monitor traffic on their global networks to detect attempted or successful penetration and take steps to mitigate the impact of security breaches.
U.S. Defense Department strategy documents warn about cyber and space threats. But where's the money to fund new capabilities?
The space weapons that U.S. military commanders fear most are not missiles aimed at satellites.
If your company or organization uses a network, there are people who want to hack it. If you haven’t tried to stop them, those hackers are probably already in your network.
Small terminals typically are easily jammed, so having an anti-jam capability in a portable system would be significant.