Home / Cyber (page 5)

Cyber

Cyber Resilience enables company to better prevent, quickly detect, contain, and recover from a cyberattack

This year has been largely dominated by the Russia-Ukraine war, with major concerns about its impact on the global threat level. Just three days after the invasion of Ukraine, on February 27th, Check Point Research (CPR) noted a 196% increase in cyber-attacks on Ukraine’s government-military sector, and a 4% increase …

Read More »

DARPA HARDEN developing designs and tools for trusted computing systems

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to market demand has forced integrated circuit design, manufacturing and testing …

Read More »

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities. In …

Read More »

DARPA SMOKE to automate cyber red teaming or penetration testing to uncover military systems vulnerabilites

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are being taken. Exposed …

Read More »

Intensified cyber warfare amid growing tensions between Governments

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks.   Cyber Warfare was brought into focus when the suspected US/Israeli Stuxnet virus infected the computers at an Iranian …

Read More »

Military Race for Integrated Cyber, Space, EW, Signals intelligence and Communications capability for Information Dominance

Joint Publication (JP 1-02) defined the electromagnetic spectrum as the “range of frequencies of electromagnetic radiation from zero to infinity” (U.S. Joint Chiefs of Staff, 2010b). In a more detailed interpretation, the electromagnetic spectrum is a series of frequencies  from the lowest to the highest frequency (longest to shortest wavelength), …

Read More »

Telecommunications is a critical infrastructure and needs to be protected from ever increasing cyber threats

Cyber-attacks are continuously growing in size and breadth, targeting organizations of all sizes across sectors, and telecom sector is no exception. According to PwC’s Global State of Information Security, 2016, IT security incidents in the telecoms sector increased 45% in 2015 compared to the year before. The rising danger posed …

Read More »

European Union (EU) cyber security and EDA cyber defence strategy calls for proactive and reactive cyber defence technology and Cyber Situation Awareness (CySA) operational capability.

The pandemic, which moved citizens’ lives into the digital sphere, saw a rise in security breaches within European businesses and institutions. Cyber attacks against key European sectors doubled in 2020. Significant malicious attacks against key sectors doubled in Europe – up to 304 incidents compared to 146 in 2019 – …

Read More »

DARPA MICEE to monitor and detect malicious activities in 5G/mobile infrastructure devices.

The New York Times reported  that the US government has defined 5G competition as a “new arms race.” According to the report, “whichever country dominates 5G will gain an economic, intelligence and military edge for much of this century.” The transition to 5G is a revolution and “this will be …

Read More »

Nation backed cyber attacks led by Russia, China, North Korea, and Iran for cyber espionage and intellectual property theft

Nation backed cyber attacks have gained currency and notoriety over the past couple of years, with , China, North Korea and Iran taking the lead in actively supporting aggressive cyber attackers, according to Israeli cyber defence firm HolistiCyber CEO Ran Shahor.   Shahor, while speaking on ‘geo-political tension and national …

Read More »
error: Content is protected !!