Home / Cyber (page 10)

Cyber

Battery management systems (BMSs) for military systems require Fault-tolerance and Cyber Security

The vision for the future soldier is to be combat effective and also highly mobile, adaptive, networked, sustainable with total battle space situation awareness and information assurance. Therefore, he is equipped with night- vision goggles, radios, smartphones, GPS, infrared sights, a laptop as well as batteries to power them. Some …

Read More »

DARPA’s SAHARA to automate Structured ASICs production and enhance their security for defense electronic systems

Time to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans. Hardware Trojans (HT), which are malicious circuit inclusions into the …

Read More »

Cyber attacks on Port facilities can cause disruptions to Shipping operations

Maritime networks have become an attractive playground for hackers, with cyber-attacks on vessel OT networks and systems increasing by 900% over the past three years.  A ship’s onboard information technology and operational technology systems can be hacked just as easily as systems ashore. Such security breaches have the potential to …

Read More »

New Physical and behavioral Biometrics technologies with increased accuracy and security being developed

Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from consumers in 2021, a nearly 27% increase over the 2.2 …

Read More »

Rising DNS attacks require DNS security measures and Protective DNS says Joint NSA and CISA Guidance

The Domain Name System (DNS) is central to the operation of modern networks, translating human-readable domain names into machine-usable Internet Protocol (IP) addresses. Email services, chat services and even social networks rely on DNS to work 24 hours a day, 7 days a week resolving IP addresses into hostnames. DNS …

Read More »

Artificial Intelligence and Machine Learning are enabling the future of fully automated Cyber Security

AI emulates human cognition – i.e. learning based on experience and patterns, rather than by inference (cause and effect). Artificial intelligence covers everything from machine learning to business intelligence. Machine learning is a branch of artificial intelligence (AI) that refers to technologies that enable computers to learn and adapt through …

Read More »

DOD adopt an initial zero-trust architecture, Trust must be continually assessed and granted in a granular fashion.

The Defense Department has been pushing hard for digital modernization, but the massive hacking campaign that breached multiple federal government agencies via Solarwinds software has put some of its more nascent efforts at risk — namely software factories. “Yes, this creates a new kind of target for our adversaries. These digital …

Read More »

USAF Agile Cyber Technology 3 (ACT 3) to develop enabling technologies to achieve cyber superiority.

Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested and/or denied. Yet our ability to address opportunities and threats …

Read More »

DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments

The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of …

Read More »

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or online transactions would not be possible without it.   Quantum …

Read More »
error: Content is protected !!