• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE, EW, CLOUD AND HOMELAND SECURITY UPDA

February 7, 2014 by

Web Page sponsored by Cassidian

www.Cassidian.com
———————————————————————–

05 Feb 14. The 6th Military Information and Communications Symposium of South Africa (MICSSA) is being held from 3-6 February at the CSIR International Conference Centre in Pretoria, South Africa. The theme of this year’s symposium is “Military Information Communication Technology within a rapidly evolving cyber world”. The symposium is a platform where military and civilian interests meet to exchange ideas, insights and contributions to policies and directions. The explosive growth of the cyber world has changed the nature of military communications from the traditional notion of radios and telex machines to a totally integrated world. This has of course also lead to a major increase in the threat facing communication infrastructure and the integrity of information. This year 17 countries are represented at the symposium, from attendees and speakers to exhibitors. These countries include Algeria, Nigeria, Angola, the United Kingdom, the United States, Spain, Canada and Russia. South Africa is the only country in Africa to host a symposium of this nature and thus caters to the growing needs of Africa. Maj Gen Bhembe, the Chief of Command Management Information Systems (CMIS) in the South African National Defence Force (SANDF) pointed out that the Southern African Development Community (SADC) does have forums where information and communication technology (ICT) is discussed and linkages between the countries forged. The African Union (AU) has drafted a charter, as has the United Nations, and South Africa plays an active part in this process. The military is part of the government cluster of departments that oversees the National Cyber Framework which aims to ensure that all government departments are on the same track with regards to the cyber future of South Africa. (Source: African Armed Forces)

05 Feb 14. A new report found more than 400 cybersecurity vulnerabilities across dozens of Defense Department programs, including the Navy’s Consolidated Afloat Networks and Enterprise Services and the DoD Automated Biometric Identification System. The findings were included in an annual report by DoD’s Office of the Director for Operational Test and Evaluation and released Jan. 29. The office assessed 33 DoD programs in fiscal 2012 and 2013. Half of the 400 security vulnerabilities were identified as category one, meaning they could allow “debilitating compromise” to DoD systems. As of November 2012, CANES had 29 category one vulnerabilities and 172 less severe vulnerabilities, the report found. It isn’t clear how many of those issues have been resolved, but the report’s most recent recommendations suggest the Navy mitigate outstanding cyber vulnerabilities prior to initial operational test and evaluation. CANES will replace legacy networks on ships, submarines and shore sites. “The majority of system vulnerabilities discovered in operational testing over the last two years could and probably should have been identified and resolved prior to these tests,” Director Michael Gilmore said of the 400 vulnerabilities. “There is general agreement that systems must be assessed for cybersecurity earlier in a system’s development,” Gilmore said in the report, adding that his office is collaborating with the under secretary of defense for acquisition, technology and logistics to revise cybersecurity policy to address the shortfall. Among the category one vulnerabilities, the most common were out-of-date or unpatched software, configurations that included known code vulnerabilities, and the use of default passwords in fielded systems, the report noted. Eighty-nine percent of the 400 vulnerabilities could have been found in developmental testing, versus the remainder that required an operational test to uncover. (Source: C4ISR & Networks)

06 Feb 14. Thales creates integrated business line to meet growth

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    May 19, 2022
    Read more
  • PARLIAMENTARY QUESTIONS

    May 13, 2022
    Read more
  • EXHIBITIONS AND CONFERENCES

    May 13, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT