25 janvier 2021 | International, C4ISR, Sécurité

Cyberdéfense des Armées : forte augmentation des effectifs à Rennes

Selon une étude publiée jeudi 21 janvier par l'INSEE Bretagne, les effectifs des Armées en cyberdéfense seront en forte augmentation sur le territoire de Rennes Métropole jusqu'en 2025. Le développement des activités de cyberdéfense du ministère des Armées dans l'agglomération rennaise devrait se traduire par la création de 1 800 postes entre 2018 et 2025, et par des recrutements, précise La Tribune. Le quartier de La Courrouze abrite la Cyberdéfense Factory, un incubateur civil et militaire, ainsi que plusieurs groupes industriels de plus de 100 salariés et impliqués dans cet écosystème. Airbus Cybersecurity (protection des gouvernements et des activités vitales), Thales Services, Altran et la CyberSoC d'Orange Cyberdéfense concentrent à eux seuls 70% de l'emploi privé. « La présence du pôle d'excellence cyber permet le développement de synergies entre la recherche, la formation et les acteurs économiques », précise l'INSEE.

La Tribune du 25 janvier

Sur le même sujet

  • Raytheon UK wins contract in $1.3B Royal Navy modernization plan

    14 janvier 2021 | International, Naval

    Raytheon UK wins contract in $1.3B Royal Navy modernization plan

    By Ed Adamczyk Jan. 13 (UPI) -- Raytheon UK won a $200 million contract to improve the Royal Navy's training, it announced on Wednesday, part of a $1.3 billion transformation of the nation's navy. The British subsidiary of the U.S. company will "provide the Royal Navy with transformative technology, training and learning solutions over the next 12 years," a Raytheon statement said. Led by the London-based outsourcing and professional services company Capita LLC, a consortium of companies will transform and modernize the Royal Navy's shore-based training at 16 sites across Britain. The contract with Capita was announced in December. Raytheon, Elbit Systems UK and Fujitsu are also among the suppliers, according to British officials. Raytheon UK will "play a key role in modernizing and transforming the Royal Navy's training analysis, design, delivery, assurance, and management/support services, helping to make the UK Armed Forces more agile and adaptable than ever to tackle future challenges," the company said in a press release. Modernization of the British military has been a key element in recent national policy. Defense Minister Ben Wallace noted on Monday that an "integrated review that we will publish in 2021 will make the most of new technologies, improve integration across the domains and demonstrate that we remain the international partner of choice." An example is Britain's Queen Elizabeth-class aircraft carriers, the first of which was commissioned in 2017 and capable of carrying helicopters and F-35 fighter planes. The HMS Queen Elizabeth is currently undergoing testing in advance of its first deployment with a carrier strike group of destroyers, cruisers and other vessels. https://www.upi.com/Defense-News/2021/01/13/Raytheon-UK-wins-contract-in-13B-Royal-Navy-modernization-plan/1181610560382/

  • American trucks land in Israel to support Iron Dome testing ahead of US Army delivery

    6 août 2020 | International, Aérospatial

    American trucks land in Israel to support Iron Dome testing ahead of US Army delivery

    By: Jen Judson   WASHINGTON — The Missile Defense Agency has paused its effort to design a defensive hypersonic missile and wants to refocus its plan of attack by concentrating on near-term options that could feed into a more “elegant” solution, according to Vice Adm. Jon Hill, the organization's director. The agency tapped industry in January to design and build an interceptor capable of defending against regional hypersonic weapons threats, releasing a draft request for proposals to build prototypes. The request directed industry to submit whitepapers by March 19 to build a Hypersonic Defense Regional Glide Phase Weapons System interceptor. The plan then was to select at least one prime contractor to build prototypes that would culminate in a flight test, according to the draft RFP. But last month, the agency updated its posting on the federal government's contract opportunities website and said the final solicitation was under review. It also said the agency was assessing COVID-19 impacts, technology maturation efforts, threat analyses, and empirical data from the recent joint Defense Department hypersonic testing in March “to accurately establish the technical baseline and future end-state for hypersonic missile defense and the (RGPWS) effort.” Agency leaders said they expect to complete the review by the end of the first quarter of fiscal 2021. “One of the reasons we took the pause and said, ‘We'll get back to you later in the year,' is we want to see what we can do in the very near-term, and I'll define the near-term as the mid-20s, and then feed the science and technology investments going so you can get to that farther-term, more elegant solution,” Hill said at the virtual Space and Missile Defense Symposium Aug. 4. “But we want to get that capability out there as soon as possible to defend against the hypersonic threat and we want to continue to build out that capability and we believe the glide phase, further back in that trajectory, is always better than the terminal systems that we got today,” Hill added. He noted that the capability to take out threats in the terminal phase of flight is still critical. But, “you will want to move back that trajectory as far as you can,” he said. Achieving “glide phase” defensive capability could come through a variety of technologies, he said, including different warhead types, different effector types and what kind of propulsion is used to get there. MDA is on a long-term path to achieving hypersonic defensive capability, but it is focused first on its Hypersonic and Ballistic Tracking Space Sensor (HBTSS), according to Hill. “That is number one, we have got to be able to sense, detect and get tracking and fire control information down to the shooter,” he said. As the agency went through its analysis of alternatives for a defensive hypersonic interceptor, “we recognized there are two paths you can take to get to a weapon system,” Hill said. MDA is going to build off its command-and-control battle management and the effectors it has in place, Hill said, adding the agency can take advantage of terrestrial-based and mobile sea-based sensing today to get tracking data and push it where it needs to go. “The question is how long do you stay in the science and technology world? You should also take a look at a quick development path and that is what we are looking at now,” Hill said. https://www.defensenews.com/digital-show-dailies/smd/2020/08/04/mda-pauses-defensive-hypersonic-missile-design-effort-to-refocus-plan/

  • What’s changing in the cyber domain? We ask industry experts

    3 septembre 2019 | International, Sécurité

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

Toutes les nouvelles