Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond – Part II

We would like to welcome you to PART II of the series 'Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond', which is all about AI technology. However, we are not discussing the general threat posed by AI. Rather, we would like to shed light on the relationship between AI technology and data leakage in particular, or how both subject influence each other in the near future.

Read more

Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond – Part I

We welcome you to the series Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond. As the name suggests, the series is dedicated to data leakage as one of the most serious threats from cyberspace. The focus of PART I in this series provides an overview of the present situation in this playing field of criminals and state actors.

Read more

How Cross Domain Solutions can support OSINT activities

OSINT OPERATIONS and CROSS DOMAIN SOLUTIONS (CDS): How CDS can help OSINT activities and overcome technological challenges OSINT or Open-source intelligence relates to the gathering of data through public sources which are processed, analyzed, and disseminated, so that this data becomes valued information/ intelligence. The data can be collected from various but only publicly available […]

Read more

What is STANAG?

There are numerous STANAGs covering a wide range of topics, including communications, logistics, intelligence, and training. Some examples include STANAG 6001, which specifies the requirements for NATO military personnel language proficiency, and STANAG 4586, which defines the standards for interoperability of military data systems.

Read more

Air Gapping and Cross Domain Solutions in a Nutshell

An air gap, also known as a “separation gap,” is a security measure used to physically isolate a computer or networks with different security requirements amongst each other. Air gaps are still widely used in today’s high security domains, mainly because of their alleged high security and they are implemented mainly through the use of […]

Read more

Of warships and cybersecurity: the challenges of modernization in times of digitalization

Navies are constantly modernising their fleet through digitalization programmes. To take advantage of new communication technologies and their numerous benefits such as real-time decision making and information sharing, former air gapped systems are being connected with the IT world. Consequently, sensitive networks are being integrated with less secure ones. Modern warships are designed to take […]

Read more

Protection des réseaux d’importance vitale en France

Depuis 2006, les infrastructures critiques ont été reconnues par le Gouvernement français comme stratégiques pour la sécurité du pays[1]. Faisant le constat de l’importance de leurs activités et du nombre croissant d’attaques-cyber pesant sur elles, la France s’est depuis dotée d’une règlementation complète afin d’assurer leur sécurité et résilience. C’est l’un des premiers pays à […]

Read more

Sécuriser les échanges de données sensibles avec des passerelles d’interconnexion

Les systèmes et données hautement sensibles sont normalement séparés d’Internet et des autres systèmes moins critiques. Cette séparation est réalisée par l’isolement de ces systèmes critiques, méthode connue sous le nom d’air gap. Bien que cette isolation protège efficacement contre tous risques d’exfiltration de données et d’attaques de logiciels malveillants, le risque de cyberattaques n’est […]

Read more

How AI can support classified information protection & cross domain solutions

Recommendation algorithms and automated checks of classified documents as well as anomaly detection using Deep Learning at critical network transitions can increase information assurance and trustworthiness when dealing with sensitive data Artificial intelligence (AI) is a current trending topic in digitization. The development has been rapid so far and sure enough, AI is yet to […]

Read more

Solving data sovereignty and classified information protection issues with the F-35 ALIS / ODIN system

US Military, Non-US partners and potential users of Lockheed Martin’s (LMCO), an American aerospace & defense corporations, F-35 Lightning II, an all-weather multi-role stealth aircraft, have concerns about the planes data collection and sharing activities or cybersecurity posture. It appears these reports even led some countries to consider cancelling their participation. The F35’s Autonomic Logistics […]

Read more

More posts