Most Recent Cyber Posts

Artificial Intelligence in Critical Applications: AI Isn’t Just for Smartphones Any More

Artificial Intelligence in Critical Applications: AI Isn’t Just for Smartphones Any More

Society is getting very comfortable with commercial applications of artificial intelligence, such as Facebook face-tagging or smartphone maps...

Read More
Engility’s Cyber Strategy 2.0: Because You Can’t Fix Cyber with Duct Tape and Bondo

Engility’s Cyber Strategy 2.0: Because You Can’t Fix Cyber with Duct Tape and Bondo

John Sahlin, Tech Lead for Engility’s defense group, shares insights into the dangers of bolting on cyber and a strategy for preparing for tomorrow’s threats.

Read More
Taming the Cybersecurity Wild West with AssureNet™

Taming the Cybersecurity Wild West with AssureNet™

Attacks like WannaCry in 2017 highlight the need for robust cybersecurity. Engility’s Floyd McKinney explores how Engility is approaching the threats.

Read More
Engility’s Cyber Warrior™ Scholarship – Committed to Our Veterans

Engility’s Cyber Warrior™ Scholarship – Committed to Our Veterans

Floyd McKinney, a U.S. Air Force veteran and leader of Engility’s Cyber ENnovation center, discusses some of the challenges military members face when transitioning into a civilian role.

Read More
Modernization Muscle

Modernization Muscle

The current Modernizing Government Technology Act of 2017 legislation is unique in that it could simultaneously affect government enterprise modernization, improve how our contribution to the federal budget is spent and protect our families from the threat of cyberterrorists.

Read More
Fight Security Decay; Practice Good Cyber Hygiene

Fight Security Decay; Practice Good Cyber Hygiene

Recent hacks like Wannacry leverage the vulnerabilities of legacy systems and poor personal cybersecurity practices. Engility’s Cyber ENnovation Center lead Floyd McKinney discusses how some of his customers enhance their defenses.

Read More
A Good Model of Behavior

A Good Model of Behavior

While many people consider basic operation and reliability of systems during modeling and simulation, there is a critical need to also model the behavior of operators using those systems in realistic scenarios.

Read More
Modeling Mayhem

Modeling Mayhem

C4ISR and cyber systems need to be fully vetted under stressful conditions that emulate actual threats and attack situations prior to acceptance. Engility M&S experts Dr. Ken Myers and Paul Vogel created a synthetic environment to evaluate technologies...

Read More
Cyber Protection Beyond the 1960s

Cyber Protection Beyond the 1960s

Robert Jarrett, Program Manager on Engility’s contract with NASA’s IV&V program, discusses the modern challenges and risks of spaceflight and how they are mitigated through vulnerability assessments.

Read More