Supercomputers have become essential for National Security, for decoding encrypted messages, simulating complex ballistics models, nuclear weapon detonations and other WMD, developing new kinds of stealth technology, and cyber defence/ attack simulation. Because of the expense, supercomputers are typically used for the most intensive calculations, like predicting climate change, or …
Read More »Industry developed new approach to protect against advanced ‘ROP’ Cyberattacks
Today’s cybersecurity playing field is fundamentally asymmetric. Attackers are easily able to identify weaknesses in a target system once they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up to secure their systems post-attack. ROP attacks are particularly insidious in …
Read More »Cyber risks of Video-conferencing apps like Zoom, popular with professionals working from home globally
Video conferencing apps like Zoom have become popular with professionals working from home globally, who are using it for virtual meetings, presentations and calls. Millions of people have turned to the app as they work and study from home amid the global lockdown. In India too it had become the …
Read More »High-assurance Network encryptors secure voice, video, and data moving over public and private IP networks
Protecting network transmitted data against cyber attacks and data breaches is imperative for government agencies. Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. The implications of a significant breach are often catastrophic. Encryption is a popular and effective method …
Read More »Global threat Intelligence and warnings shared by Cyber Agencies enables mitigating cyber threats before large scale exploitation by hackers
According to the World Economic Forum’s 2016 Global Risks Report, cyber-security is recognised as one of the greatest threats to business worldwide, and the global cost of crimes in cyberspace is estimated to be $445bn. By 2021, cybercrime damage is estimated to hit $6 trillion annually. To put that in …
Read More »Cyber attacks as big a threat to warships as missiles and torpedoes, Navies develop cyber security policy and risk management
The maritime sector is on the verge of a digital disruption. As digital transformation of the maritime sector is gathering momentum that will have a major impact on operations and existing business models, simultaneously the threat cyber attacks is emerging. Further the sector’s infrastructure will be exposed to more and …
Read More »Emerging AI and machine learning based cyber security deception technology includes cyber traps and decoys.
The number of threats organizations face continues to go up. Attacks grow more sophisticated and target more widely. Current security tools are very good at flagging up anomalies but not so good at defining their impact and risk potential. The result is a hailstorm of alerts, most of which need …
Read More »SpaceChain deploys Internet of blockchains , other Countries also plan Blockchain space technology,
Historically, there was a necessity for a third party that demanded a payment to perform transactions or submit information to ensure the accuracy of transactions and create a reliable history. Blockchain eradicates the need for an intermediary through creating a trustless medium of exchange and immutable public ledger. It creates …
Read More »DARPA Media forensics to detect fake photos and videos on social media to support National Security
In recent years consumer imaging technology (digital cameras, mobile phones, etc.) has become ubiquitous, allowing people the world over to take and share images and video instantaneously. Mirroring this rise in digital imagery is the associated ability for even relatively unskilled users to manipulate and distort the message of the …
Read More »Blockchain technology of decentralized digital currency to enhance security of additive manufacturing in Internet of Things to Military 3D printing
Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or company owns or controls, ensures security of transfer of funds through public and private cryptology and third parties to verify that they shook, digitally, on an agreement. A blockchain is, in the simplest …
Read More »