20 novembre 2018 | International, Terrestre

Czech MoD seeks light 4x4 vehicles for airborne battalion

The Czech Ministry of Defence (MoD) plans to procure a fleet of 4x4 lightweight vehicles to fulfil an urgent requirement for the Army of the Czech Republic (ACR) to equip an airborne battalion planned for activation in 2020.

The ACR is considering the Gepard, a new 4x4 vehicle based on the Toyota Land Cruiser Model 70 being offered in a rapid-deployment version and long-range patrol version by a Czech consortium of indigenous vehicle suppliers Dajbych, Tatra Defence Vehicles, and Optokon.

The criteria for the platform include that it can accommodate six fully equipped personnel and can be fitted with modular ballistic protection.

https://www.janes.com/article/84687/czech-mod-seeks-light-4x4-vehicles-for-airborne-battalion

Sur le même sujet

  • The Air Force sends good guys in to hack its cloud

    8 août 2019 | International, Sécurité

    The Air Force sends good guys in to hack its cloud

    By: Andrew Eversden The Air Force invited ethical hackers into its IT networks again this spring, allowing good guys the chance to infiltrate its enterprise-wide Air Force Common Computing Environment in search of vulnerabilities, the white hat hacking company Bugcrowd announced Aug. 6. The bug bounty program, done in a partnership with Bugcrowd and the Air Force's CCE program office, found 54 vulnerabilities. Bug bounties work under the assumption that the customer, in this case the Air Force, will now close the loopholes the hackers found, making the system more secure. The CCE cloud uses Amazon Web Services and Microsoft's Azure commercial cloud. The service plans to migrate more than 100 applications to that cloud environment, Bugcrowd executives said. The largest payout from the bug bounty totaled $20,000. The event ran from March 18 to June 21 at Hanscom Air Force Base in Massachusetts. Casey Ellis, Bugcrowd founder and CTO, said it was the first time Bugcrowd has worked with the Air Force. The Air Force has completed several other white hat hacking events with the firm HackerOne. Ellis said that moving to the cloud from on-premise environment represents a “paradigm shift” for many organizations. Penetration testing is an important part of keeping that environment secure, he said. Bugcrowd conducted such tests in six phases: source code analysis, AWS environment testing, Azure environment testing, black box network authentication assessment, social engineering engagement and Air Force portal testing. Bugcrowd declined to discuss how many vulnerabilities were found throughout each stage of the process. According to a news release from the Air Force from April, the CCE currently houses 21 Air Force applications and "has room for countess more.” The computing environment allows the Air Force to have a cloud to host its applications that reside on its Global Combat Support System, which is a centralized, cohesive enterprise resource planning system. The Air Force said in the April release that each migration costs $446,000 and that the service has spent more than $136 million on the program since 2016. https://www.fifthdomain.com/dod/air-force/2019/08/06/the-air-force-sends-good-guys-in-to-hack-its-cloud/

  • Lockheed successfully tests multiple-launch rocket system

    5 mars 2021 | International, Aérospatial

    Lockheed successfully tests multiple-launch rocket system

    Lockheed Martin recently ran a successful test of its next-generation Extended-Range Guided Multiple Launch Rocket System at White Sands Missile Range in New Mexico.

  • Poland buys Saab grenade launchers in $1.63 billion deal

    4 mars 2024 | International, Aérospatial

    Poland buys Saab grenade launchers in $1.63 billion deal

Toutes les nouvelles