Share PNT Podcast
Share to email
Share to Facebook
Share to X
By Safran
5
22 ratings
The podcast currently has 13 episodes available.
We discuss viewing PNT as a Cybersecurity Issue, the PNT Conformance Framework, and how Zero Trust Architecture principles apply to PNT.
The resources Ernest mentions on this episode are available at: https://www.dhs.gov/science-and-technology/pnt-program
At a combined 254 pages, there was a lot of detail you could have easily missed, but a few items of note for commercial infrastructure IT decision makers caught our attention.
Traceable Time as a Service delivers accurate, traceable time over a secure VPN connection to provide a traceable time reference for your network.
Cybersecurity is a hot topic today. Hackers are always looking to undermine our network connections and we are always trying to protect against them. What role does PNT play?
Time synchronization is the ability for all clocks to have the same time. But what time is it? If your time synchronization deployment uses time from the internet, your organization may be at risk.
GPS and other GNSS operating in Medium Earth Orbit (MEO) are the primary domain for Positioning, Navigation and Timing (PNT) services. But these signals are weak and subject to interference, both intentional and unintentional.
Positioning, navigation and timing (PNT) solutions are at the heart of critical military operations, powering everything from precision missile defense systems and warfighter navigation to Intelligence, Surveillance and Reconnaissance (ISR) data management.
Keeping accurate time is fundamental to many cybersecurity applications. We summarize a few best practices to reduce the risk of attack.
A recent decision will keep the leap second around until at least 2023. Understand the leap second vulnerability and plan ahead for the next leap second so that your applications will continue to operate smoothly.
The podcast currently has 13 episodes available.