Ships are increasingly using systems that rely on digitization, integration, and automation. Offensive actors understand the naval reliance on communications, ISR, and visualization technologies, and perceive them as vulnerable to disruption and exploitation. In 2016, the Baltic and International Maritime Council (BIMCO) in their “Guidelines on Cyber Security Onboard Ships,” warned about the …
Read More »Cyber
Multi-factor authentication has become essential to protect accounts in commercial and military
The traditional, not so secure way to log in to your bank account: enter your username and that familiar password you probably use for most of your online accounts. Then, you’re in. You can go about your business. If you’re one of the 54% of consumers who, according to TeleSign, …
Read More »Australia facing cyber attacks by sophisticated state-based cyber actor, implementing Cyber Vision 2020, cyber security strategy, cyber science and technology plan
The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is exerted within, and through cyberspace domain, much like the land, …
Read More »Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches
Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The …
Read More »Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies
Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The major …
Read More »US Defense Industrial Base facing growing supply chain risks from China including cyber threats, launches new security measures
The Department of Defense (DOD) relies on a wideranging and complex industrial base for the products and services that enable the Department’s warfighting capabilities. The domestic DIB includes public-sector (government-owned, government-operated) facilities and private-sector (commercial) companies located in the United States. The commercial companies that contract with DOD are diverse, …
Read More »Firewalls are evolving to continue being a first line of defense as the Cyber-attacks like malware, ransomware are becoming sophisticated
A firewall is a network protection solution designed to prevent unauthorized access to or from a private network by establishing a barrier between your internal network and incoming traffic from external sources (such as the internet) . It is a network security device that monitors incoming and outgoing network traffic …
Read More »With cyberspace becoming a new battlefield, China developing cyber capabilities aiming to become a major cyber power
News stories on the cyber threat that China poses appear on a regular basis. Most underscore a view that China is using cyber power to rise and ultimately win global dominance, and that the Chinese government is behind the scenes in many malicious cyber activities. Many, including the US government, …
Read More »Indian Threat Scenario, National security threats and future military capability requirements
There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging technologies that can offer new military capability. Coming to …
Read More »Rising security threats to Smart homes their security requirements and measures for protection
A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the internet, allowing the user to control functions such as security …
Read More »