We are excited to invite our military and government partners to join Two Six Technologies, SMX, and Google for a Capabilities Showcase hosted on the USS Missouri in Honolulu, HI on Tuesday, July 30, 2024. Enjoy food and refreshments while you learn about our mission-focused capabilities, followed by a networking social. Contact solutions@twosixtech.com to find out how to register today.
Two Six Technologies
Software Development
Arlington, Virginia 6,688 followers
Innovation at speed to solve global challenges.
About us
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Through private R&D, relentless innovation, and deep technical expertise in cyber, information operations, data science, electronic systems, mobility, and user experience, we serve customers that include DARPA, the Department of State, U.S. Cyber Command, the Department of Homeland Security, and beyond. Learn more at www.twosixtech.com
- Website
-
http://www.twosixtech.com
External link for Two Six Technologies
- Industry
- Software Development
- Company size
- 501-1,000 employees
- Headquarters
- Arlington, Virginia
- Type
- Privately Held
- Founded
- 2021
- Specialties
- Cybersecurity, Data Science, Information Operations, Microelectronics, and mobile
Locations
Employees at Two Six Technologies
Updates
-
As Pride Month comes to an end, Two Six encourages you to conclude the month with knowledge. Check out the following reads on LGBTQIA+ history, events, and pillars in the community. Educate yourself, embrace diversity, and spread love. Pride: An Inspirational History of the LGBTQIA Movement:https://lnkd.in/eEQv5r3x The Little Book of Pride: The History, the People, the Parades: https://lnkd.in/e4FiBhj4 Stonewall: The Definitive Story of the LGBTQ Rights Uprising that Changed America: https://lnkd.in/e_tJaHgq
-
As we approach the beginning of a new election cycle—both abroad and within the US—questions for election tampering and misinformation have begun to arise. However, foreign election interference is more nuanced than it may seem. Two Six Tech’s Media Manipulation Monitor (M3) tracks Russian and Chinese information operations and releases analysis in the Biannual Manipulation Report (BAM). For more data-backed, actionable insights about Moscow’s messaging, please reach out to solutions@twosixtech.com to request a copy of our Russia Biannual Manipulation Report and to learn more about our analytic products analyzing Kremlin messaging every week.
-
Last week, we had the pleasure of hosting our 2024 Two Six Family Picnic at the Nova Wild Zoo in Vienna, Virginia. It was wonderful to see so many of us gathered together, creating lasting memories with our coworkers, families, and friends. For the second consecutive year, we held a Community Food Drive in partnership with the Arlington Food Assistance Center (AFAC). This year, we successfully donated over 200 lbs of non-perishable items to help those in need. This incredible effort highlights our dedication to supporting our community and making a positive impact.
-
-
-
-
-
+1
-
-
Make an impact on missions critical to U.S. national security at Two Six Technologies. Join our growing team as a Lead Contracts Administrator in Arlington, VA. This is a hybrid position. Find out more here: https://lnkd.in/eZ49jVHT
-
-
Two Six Board Member Teresa Shea was interviewed on the McCrary Institute's Cyber Focus podcast discussing the multifaceted world of artificial intelligence (AI) pertaining to cybersecurity and intelligence gathering. The full podcast can be found here: https://lnkd.in/emTbxJmk
Teresa Shea told us on Cyber Focus we need to get over our fear of A.I. and learn more about it. "So we have a lot of fear, I think, built up about A.I. and taking over the world, etc. I think we need to overcome that and start to learn how it works and find out where those risks are, where it's vulnerable."
-
While mainstream quantum computing won’t be arriving anytime soon, there are enormous amounts of cybersecurity infrastructure critical to national security that rely on algorithms vulnerable to attacks by quantum computers. Read more in the 𝑪𝒐𝒅𝒊𝒏𝒈 & 𝑬𝒏𝒄𝒓𝒚𝒑𝒕𝒊𝒏𝒈: 𝑸𝒖𝒂𝒏𝒕𝒖𝒎-𝑹𝒆𝒔𝒊𝒔𝒕𝒂𝒏𝒕 𝑪𝒓𝒚𝒑𝒕𝒐𝒈𝒓𝒂𝒑𝒉𝒚 𝒘𝒊𝒕𝒉 𝑬𝒓𝒓𝒐𝒓-𝑪𝒐𝒓𝒓𝒆𝒄𝒕𝒊𝒏𝒈 𝑪𝒐𝒅𝒆𝒔 blog post written by Zach Flores, located here: https://lnkd.in/exsQXSQC
-
-
The Two Six team showed up and showed out at yesterday’s Corporate FunRun 5k held at Bluemont Park. Four of the top ten best run times were earned by TST employees! Congrats to our first place male winner, Zach S., and first place female winner, Anna S. Thank you to everyone who participated in the race or came out to show moral support. We had a great time!
-
-
Exciting times at Two Six Technologies! We're thrilled to have our Summer 2024 Internship Program in full swing. This week is Intern Week, and we've enjoyed hosting various activities together, watching our interns bond and make memories with each other and our amazing staff. Here's to a Summer of learning, collaboration, and growth!
-
-
Is your organization prepared for the transition to zero trust? David Bray, PhD, shares his thoughts on why zero trust is a must-do for all organizations and his thoughts on our Cracks in the Foundation of Zero Trust white paper. Previously, David joined Chris Greenlee, VP of Trusted Concepts, and Peter Scott, VP of Product for a zero trust webinar hosted by AFCEA International.
Leader Skilled at Directing Transformative Change in Turbulent Environments at the Intersection of Tech, Data, and People | Named One of "24 Americans Changing the World" by Business Insider
#BottomLineUpFront: For #Executives with all #organizations and for those of us fortunate to live in free #societies like our own, #together we need adopt "zero trust architectures" to our digital connectedness, meaning we continuously verify elements of our network to triangulate their reliability. This short piece dives into #why & #how the different elements of zero trust are “stitched together” akin to a #quilt #matters #immensely – it’s quite possible that orgs following just a checklist might get all the elements right, yet not connect the different elements successfully. Relying just on checklists of security elements alone won’t achieve the #necessary #stitching #together of different digital elements to achieve zero trust architectures. #OnwardsAndUpwards #Together including The Stimson Center National Academy of Public Administration Business Executives for National Security (BENS) Trent Teyema 🌎David T. Ackerman, Esq. Dana W. Hudson Anthony Scriffignano, Ph.D. Alan Shark Theresa Pardo Daniel Chenok Dave Wennergren Karen S. Evans Stan Soloway Ellen McCarthy Jake Shapiro Sue Gordon Chuck Brooks Kellee M. Franklin, PhD Jacqueline Acker, CIPP/M, CIPP/US, AIGP Robert Brose Robert W. Milford James Cook Melissa Marr Bob G. Matt Abrams Kitty Wooley Wanda Jones-Heath, PhD, CISM Melissa Vice Sally Kenyon Grant Eric Sapp Jeff Jonas Troy Schneider Francisco Molinero R "Ray" Wang Dion Hinchcliffe Teresa Carlson Rhonda Vetere Perry Hewitt Samuel Blazek, PhD Peter Scott #tech #data #leadership
Why Security Checklists Alone Are Insufficient for the Zero Trust Era
David Bray, PhD on LinkedIn