Recent Posts

Optical Networks Vulnerabilities and Security threats

Optical networks are vulnerable to several types of security breaches or attacks, typically aimed at disrupting the service or gaining unauthorized access to carried data, i.e., eavesdropping. Depending on the aim of the attack, security breaches can induce financial losses to the clients or cause network-wide service disruption, possibly leading to huge …

Read More »

Militaries thrust on Autonomous convoys or Vehicle swarm technology for building Autonomy-Enabled Future Force

Recent combat operations have continually demonstrated the vulnerability of convoys due to their fundamental requirement for delivering sustainment supplies over long distances of unsecured routes. This operational reality of convoy missions makes them particularly vulnerable to attack and ambush. According to US DOD  52 percent of all battlefield casualties are …

Read More »

Technical risk management

All organizations face uncertainty. The effect this uncertainty has on an organization’s objectives is referred to as “risk.” The challenge for management is to determine how much uncertainty or risk to accept and how to manage it to an acceptable level.   Risk management includes the strategies, processes, systems, and …

Read More »
error: Content is protected !!