• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact

Image created by Gemini

The State of Space Security Heading into 2026

January 20, 2026

This blog post was created based on the transcript from episode 254 of the Exploring Information Security podcast. First draft by Gemini; edited by a human.

For decades, the concept of space security was relegated to science fiction or the classified halls of government agencies. Today, however, our entire way of life—from the synchronization of power grids to global financial transactions—is predicated on data traversing the stars.

In a live recording of the Exploring Information Security podcast, I sat down with Tim Fowler, CEO and founder of Ethos Labs LLC, to discuss why space is the ultimate culmination of all security specializations.

The "Veil of Obscurity" is Lifting

Historically, space systems relied on a "veil of obscurity" or technological supremacy for protection. Because it was so difficult and expensive to communicate with an orbiting satellite, security was often deprioritized in favor of pure operations.

Fowler notes that this obscurity is now gone. With the rapid commercialization of space, the technological barriers to entry have plummeted. The focus on security is still well behind and is likely too be a repeat of history where organizations will have to scramble to bolt on security.

Why Terrestrial Life Depends on Space Security

One of the most sobering points of the discussion was the real-world impact of a space-based security event. While many associate GPS only with navigation, it is actually the primary timing source for critical terrestrial infrastructure.

  • Financial Systems: Stock exchanges rely on GPS timing for transaction synchronization.

  • Power Grids: America’s "just-in-time" grid uses space-based timing to desynchronize or ramp production.

  • Pipelines: Crucial infrastructure synchronization is often tethered to orbital data.

A disruption in space doesn't just stay in orbit; it can cause rolling blackouts or freeze ATMs right here on the ground.

The Encryption Gap and Integrity Risks

A persistent challenge in the field is the lack of basic encryption. Fowler reported being surprised if even 50% of current space signals are encrypted, often due to the operational complexities of managing keys in orbit.

Furthermore, encryption only solves for confidentiality, not integrity. Even an encrypted signal can be captured and "replayed" by an attacker, leading a satellite to process potentially malicious commands because it lacks the layers to verify the signal's integrity.

Integrating Security with Development

Fowler argued that the most effective way to secure the "Final Frontier" is by moving security closer to operations.

  • Security Involved Early: The best model involves physically placing security testers (like penetration testers) directly within development teams.

  • Offensive Education: Teaching developers how to attack their own software is one of the most effective proactive measures to stop vulnerabilities before they launch.

The Future of Space Security and Ethos Labs

Despite the challenges, the industry is seeing an uptick in security engineering roles. For those looking to get involved, resources like the Aerospace Village and specialized training platforms are becoming more accessible.

Fowler also teased exciting developments for Ethos Labs in early 2026, including:

  • "Fun Size" Hardware: A new, smaller hardware platform that is easier to manufacture and ship.

  • On-Demand Classes: For the first time, hardware classes will be available in a guided, drop-shipped on-demand format.

  • Centralized Repository: A new brand under Ethos Labs aimed at being a one-stop-shop for space security videos, blog posts, and training.

Final Thoughts: AI and the Human in the Loop

Our discussion concluded with AI’s role in space. While AI is excellent for anomaly detection and "busy work" like high-speed sensor analysis, Fowler insists that mission-critical decisions must always have a human in the loop. In space, a misunderstood data point can rapidly escalate into a hostile international incident.

Want to dive deeper? Check out ethoslabs.space for more information on the upcoming hardware kits and space security training.

In Podcast Tags Space Cybersecurity, Hacking Space, Space
← Unlock Your Online Freedom: Why 2026 is the Year You Master the Password Manager How to Scan Your Home Network for Unauthorized Devices and Botnets →

Latest PoDCASTS

Featured
Jan 27, 2026
How to Build an AI Governance Program with Walter Haydock
Jan 27, 2026
Jan 27, 2026
Jan 20, 2026
Exploring Cribl: Sifting Gold from Data Noise for Cost and Security
Jan 20, 2026
Jan 20, 2026
Jan 13, 2026
What is BSides ICS?
Jan 13, 2026
Jan 13, 2026
Jan 6, 2026
Cybersecurity Career Panel: Transitioning from Technical to Leadership
Jan 6, 2026
Jan 6, 2026
Dec 30, 2025
What is React2Shell (CVE-2025-55182)?
Dec 30, 2025
Dec 30, 2025
Dec 23, 2025
[RERELEASE] What is application security?
Dec 23, 2025
Dec 23, 2025
Dec 16, 2025
The Final Frontier of Security: The State of Space Security with Tim Fowler
Dec 16, 2025
Dec 16, 2025
Dec 9, 2025
How to Manage Cybersecurity Awareness Month
Dec 9, 2025
Dec 9, 2025
Dec 2, 2025
Exploring the Next Frontier of IAM: Shared Signals and Data Analytics
Dec 2, 2025
Dec 2, 2025
Nov 25, 2025
How to Close the Cybersecurity Skills Gap with a Student Powered SOC
Nov 25, 2025
Nov 25, 2025

Powered by Squarespace