EURONAVAL will be held from 20th to 23rd October 2020 in Paris-le Bourget

EURONAVAL will be held from 20th to 23rd October 2020 in Paris-le Bourget

With web-conferences, workshops and BtoB meetings, a space dedicated to start-ups, a new “Cyber Naval Hub” exhibition pavilion, Naval-Online, EURONAVAL reveals the main features of its 27th edition…

Read More

INDRA ACQUIRES SIA AND CREATES THE LEADING CYBERSECURITY SERVICES FIRM IN SPAIN AND PORTUGAL

INDRA ACQUIRES SIA AND CREATES THE LEADING CYBERSECURITY SERVICES FIRM IN SPAIN AND PORTUGAL

The joint offer includes services and products such as identity and access management, electronic signatures, integrated risk management, security infrastructure, threat and vulnerability management, and data protection…

Read More

To improve interconnectivity between platforms, Thales launches NEXEN

To improve interconnectivity between platforms, Thales launches NEXEN

Air combat is becoming increasingly reliant on the interconnected platforms that exchange digital data with each other. Real-time data correlation provides information superiority to the armed forces. Their missions require many means of communication to be managed without worrying about which transmission channel is to be used. Thales therefore proposes NEXEN, a secure communications server which gives pilots a reliable and simplified source of connectivity.

At the heart of aeronautical connectivity, NEXEN integrates all the functions necessary for a military aircraft to exchange data in real-time. Thanks to NEXEN, all resources can be shared; with each security level assigned its own dedicated transmission chain. With its ANSSI-certified enclosure, NEXEN guarantees not only the separation of data flows according to their level of confidentiality but also the implementation of the best cybersecurity protections. The pilot is able to manage all radios at the same time, limiting the overall workload. Mission systems are able to efficiently exchange their respective data in real-time. Therefore, this solution will allow pilots to focus better on their core mission during moments of critical decision-making.

Read More

Interview with Ram Levi and Guy-Philippe Goldstein

Interview with Ram Levi and Guy-Philippe Goldstein

SDBR: Israel has been called a "start-up nation". Did that promote the development of cybersecurity in Israel?

Ram Levi *: Israel has become a Cyber ​​start-up nation because the imperative of security has become essential due to the country’s growing reliance on its digital systems. This primary importance means the required full engagement of all stakeholders on cybersecurity issues, all under the direct leadership of the Prime Minister [Chief Executive in the Israeli parliamentary system]. Accordingly, this new security priority has been rightly prioritized by members of the ecosystem, but it must be also highlighted that on this specific topic, the Prime Minister has really taken the lead. Indeed, there has been a genuine, personal involvement by the Prime Minister and this should be all the more stressed that it is actually something quite rare in terms of cybersecurity governance worldwide. Of course, this "Top-Down" ambition could only be fully realized but because there were already Bottom-Up capabilities in Israel. Since the beginning of the 2000s, the country has created superb high-tech capabilities and the topic of cybersecurity has subsequently been identified as a strategic matter. In 2010, the existence of the Stuxnet malware [against uranium enrichment centers in Iran] was made public. We knew what was possible. So, we understood what others could do against us as well. Thus, we also needed new protection.

Read More

A city under the control of cybercriminals: Baltimore (Maryland)

A city under the control of cybercriminals: Baltimore (Maryland)

Since May 7, the city of Baltimore (US East Coast) is the victim of a cyber-attack. Initially, the Democrat local government of this city of 630,000 inhabitants concealed the scale of the attack and it was not until May 28, 3 weeks after the beginning of the hacking, to know details. The hackers managed to infect 10,000 local computers and encrypt them remotely…

Read More