Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations …
Read More »Masonry Layout
Future Software intensive and software defined military systems need new policies and technologies to field, maintain, update and upgrade software
Software is everywhere and is in almost everything that the Department operates and uses. Software …
Read More »Future Smart Soliders require Man-portable military electronic systems
The vision for the future soldier is to be combat effective and also highly mobile, …
Read More »France thrust on counter terrorism initiatives after glaring security gaps exposed by brazen attacks
France suffered a series of deadly terror attacks in November 2015. In 2015, the brazen …
Read More »DARPA CONCERTO developing single reconfigurable UAV payload for communications, radar and electronic warfare functions to enhance UAS adaptability and mission efficiency
Unmanned Aerial Systems are gaining more importance every single day. Unmanned Aircraft Systems (UAS) are …
Read More »Changing role of Military Scientific and Technical Intelligence ( S&TI)
If the Militaries are to fight and win in future wars, it must thoroughly understand …
Read More »DARPA OPS-5G to mitigate security threats facing 5G and future wireless networks in military appliations
5G is the latest in a series of evolutions in public mobile networking, with widespread …
Read More »Militaries developing wide range of aircrafts for electronic-warfare capable of tactical jamming to ectronic attack
All modern forces depend on unimpeded access to, and use of, the EM spectrum in …
Read More »IARPA pursues anticipatory intelligence to predict the unpredictable , Video to open source collection & analysis to Quantum amd Exascale computing
The Intelligence Advanced Research Projects Activity (IARPA) is an organization within the Office of the …
Read More »Quantum cryptography vulnerable to hacking too, Researchers developing hackerproof MDI QKD schemes to enhance network encryption
With the age of quantum computing drawing ever-closer, traditional encryption methods are at risk. While …
Read More »