The satellite industry has so far managed to avoid a high-profile cyber attack, something experts attribute both to the industry’s vigilance and how oblivious much of the world is to the magnitude of the services it provides.
Electronic threats against satellite communication have rapidly escalated in the last few years and will continue to advance in the foreseeable future.
Satellite is on the brink of a new era. With many changes in the industry, new business models on the horizon and plenty of innovators are revolutionizing the satellite space, the 20th VSAT Global & Next Generation Satellite Applications event…
An audit by the Defense Department’s inspector general office found security cracks in the supply chain of four critical military space programs.
Small satellites that have propulsion systems, but don’t have encrypted commanding systems, pose a small but real threat of being hacked and endangering other satellites, according to a new study.
The National Oceanic and Atmospheric Administration’s Commercial Remote Sensing Regulatory Affairs office plans to roll out a tiered approach to evaluating company data-protection plans.
For cybersecurity experts, it’s clearcut: smallsat operators should take the same precautions as large satellite operators, including encrypting uplinks and downlinks, safeguarding ground stations and monitoring network activity.
Air Force Space Command is being relieved of the responsibility of fighting hackers in cyberspace. The job now belongs to Air Combat Command.
Parsons will be pursuing more Air Force and NASA work, especially in small satellite prototyping and engineering development.
The European Centre for Space Law (ECSL), was established under the auspices of the European Space Agency (ESA) in 1989, with a mandate to promote awareness, knowledge and the development of the legal framework relevant to space activities.
When the nonprofit Space Foundation began devoting the first day of its annual Space Symposium to cybersecurity in 2010, the forum was unclassified. In recent years, however, the event has been restricted to U.S. citizens with Top Secret/Sensitive Compartmented Information or code-word clearance.
In spite of all the safeguards, companies must continually monitor traffic on their global networks to detect attempted or successful penetration and take steps to mitigate the impact of security breaches.
U.S. Defense Department strategy documents warn about cyber and space threats. But where's the money to fund new capabilities?
The space weapons that U.S. military commanders fear most are not missiles aimed at satellites.
If your company or organization uses a network, there are people who want to hack it. If you haven’t tried to stop them, those hackers are probably already in your network.