Category Critical & Emerging Technologies

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or…

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most…

DARPA’s DyNAMO and C2E demonstrated Secure, Jam Resistant and Adaptable Airborne Networks for Collaborative team of Manned & Unmanned Platforms

Chinese military has been engaged in comprehensive modernization of  its air, naval, and ground forces, while incorporating a variety of anti-access/area denial (A2/AD) systems and capabilities.  “To operate against adversaries with “anti-access / area denial” capabilities the U.S. needs to…