219 results
of 15
Ahead of Cyber Threat Intelligence & Incident Response 2016, we explored the exhibition floor of a recent infosec trade show to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market....
As information security threats to private businesses continue to increase, the risk to public data broadens, undoubtedly demanding a stronger and more coordinated effort between the private industry and the authorities.
This article examines the evolving Hybrid Threat, its potential to pose existential threats to homeland security, its resistance to conventional, unilateral approaches and countermeasures, and proposes a highly cohesive, multi-dimensional approach merging Enterprise T...
The emergence of new conflicts in the past twelve months has forced new demands on airborne ISR assets. In response, intelligence chiefs are calling for major changes to spending priorities before these problems become insurmountable…
The top threats being brought right into your living room
Is it possible that ISIL is using the whole world as their ‘edge’? Has western civilisation been experiencing sustained attacks utilising net centric warfare concepts without our even being aware this was happening? If we have been unable to connect the dots because...
The trajectory of Russia’s national policy combined with its on-going rearmament programme poses a growing threat to security in the Euro-Atlantic. Russian actions in Georgia in 2008, Ukraine since 2014, and the scale and scope of its ‘snap’ military exercises, especial...
Vehicle survivability is a key topic in the current public debate surrounding operations in Afghanistan. The subsequent interest this debate has mobilised has pressured manufacturers to find a solution to produce armoured vehicles that can protect ISAF troops from the...
Electronic counter measures (ECM) such as jammers are equipment items of enormous importance to soldiers in Afghanistan to counter the threat from radio-controlled IEDs (RCIEDs). ECM, where available and when used correctly, has proven an extremely effective counter a...
The history of Chinese cyber attacks on American networks is rooted in the history of how China views the western world. According to Lt Col Bill Hagestad, Author of ‘21st Century Chinese Warfare’, you "cannot pick up a newspaper or read a blog without hearing about t...
219 results
of 15