presented by
New capabilities make GA-ASI’s MQ-9A Reaper® more resilient against cyber threats & anti-aircraft weapons

New capabilities make GA-ASI’s MQ-9A Reaper® more resilient against cyber threats & anti-aircraft weapons
New capabilities make GA-ASI’s MQ-9A Reaper® more resilient against cyber threats & anti-aircraft weapons

These upgrades will play a central role in the way American and allied forces fight, and are destined to keep them at the vanguard for a long time.

Space Force plans late FY24 award for ‘Digital Bloodhound’ to sniff out cyber attacks

Space Force plans late FY24 award for ‘Digital Bloodhound’ to sniff out cyber attacks
Space Force plans late FY24 award for ‘Digital Bloodhound’ to sniff out cyber attacks

Digital Bloodhound will develop tools such as the Manticore software suite that identifies cyber vulnerabilities, and the Kraken software that throws up real-time defenses against ongoing attacks.

Resecurity introduces Novel Cyber Intelligence Platform at African Land Forces Summit (ALFS22)

Resecurity introduces Novel Cyber Intelligence Platform at African Land Forces Summit (ALFS22)
Resecurity introduces Novel Cyber Intelligence Platform at African Land Forces Summit (ALFS22)

Los-Angeles cybersecurity company sets its sights on rapidly expanding across the Sahel G5 region with AI-powered solutions for defense

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals
NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said. 

Space Organizations Partner To Boost Cybersecurity

Space Organizations Partner To Boost Cybersecurity
Space Organizations Partner To Boost Cybersecurity

“We don’t have a parochial view, thinking that because [a cyber incident] happened over there [in that industry], it can’t happen here [in the space industry],” AIAA’s Lee says.

FCC’s Carr: Close Chinese Backdoors Into US Networks

FCC’s Carr: Close Chinese Backdoors Into US Networks
FCC’s Carr: Close Chinese Backdoors Into US Networks

“It’s the presence of this insecure gear in our networks that’s the threat, not the source of funding used to purchase it,” Commissioner Carr said.

Why Was The SolarWinds Campaign So Difficult to Detect?

Why Was The SolarWinds Campaign So Difficult to Detect?
Why Was The SolarWinds Campaign So Difficult to Detect?

Only after months of investigation by nearly 100 highly skilled digital forensics experts did FireEye discover the malicious “implant” in the most unlikely place. We break it all down in plain language.

Industry, USG Meet To Stop Space Cyber Threats

Industry, USG Meet To Stop Space Cyber Threats
Industry, USG Meet To Stop Space Cyber Threats

The Space-ISAC will help space companies understand and comply with DoD’s new Cyber Maturity Model Certification to qualify for contracts.

Why We Need A Cyber Doctrine Now

We’ve heard national security leaders at the highest levels say it repeatedly: we are not prepared for cyber war. Gen. Keith Alexander, director of the National Security Agency and commander of U.S. Cyber Command, made it clear when he rated America’s readiness for addressing a catastrophic cyber attack “three on a scale of ten.” Homeland…