Trending News
Home / Cyber (page 11)

Cyber

Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The …

Read More »

Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The major  …

Read More »

US Defense Industrial Base facing growing supply chain risks from China including cyber threats, launches new security measures

The Department of Defense (DOD) relies on a wideranging and complex industrial base for the products and services that enable the Department’s warfighting capabilities. The domestic DIB includes public-sector (government-owned, government-operated) facilities and private-sector (commercial) companies located in the United States. The commercial companies that contract with DOD are diverse, …

Read More »

Firewalls are evolving to continue being a first line of defense as the Cyber-attacks like malware, ransomware are becoming sophisticated

A firewall is a network protection solution designed to prevent unauthorized access to or from a private network by establishing a barrier between your internal network and incoming traffic from external sources (such as the internet) .  It is a network security device that monitors incoming and outgoing network traffic …

Read More »

With cyberspace becoming a new battlefield, China developing cyber capabilities aiming to become a major cyber power

News stories on the cyber threat that China poses appear on a regular basis. Most underscore a view that China is using cyber power to rise and ultimately win global dominance, and that the Chinese government is behind the scenes in many malicious cyber activities. Many, including the US government, …

Read More »

Indian Threat Scenario, National security threats and future military capability requirements

There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging technologies that can offer new military capability.   Coming to …

Read More »

Rising security threats to Smart homes their security requirements and measures for protection

A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the internet, allowing the user to control functions such as security …

Read More »

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets, and laptop computers. At the same time this has also …

Read More »

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of the wheel to a computer that can make intelligent decisions …

Read More »

After initial Hype and amid Cyber Warfare threat, Network Centric Warfare approach is now being adopted realistically in various Militaries

As the 21st Century battlefield becomes increasingly complex and asymmetrical, military forces are striving to harness network technology to gain an operational advantage, by transforming traditional linear command structures and linking sensors, unmanned vehicles, command posts and ground troops to achieve decision superiority for full spectrum dominance.   Network Centric …

Read More »
error: Content is protected !!