18 avril 2023 | International, Aérospatial, C4ISR

Elbit Systems Awarded Contract Worth Approximately $100 Million to Supply Intelligence and EW Aircraft to an International Customer

As part of the contract, Elbit Systems will equip the aircraft with advanced Intelligence Mission Suite and EW capabilities

https://www.epicos.com/article/759676/elbit-systems-awarded-contract-worth-approximately-100-million-supply-intelligence

Sur le même sujet

  • New AI system fills rifle sights with extensive, easy-to-digest info

    13 septembre 2021 | International, Terrestre, C4ISR

    New AI system fills rifle sights with extensive, easy-to-digest info

    Assault rifles with the Elbit System's new artificial intelligence data platform transform soldiers' view to resemble a first-person shooter video game.

  • Fincantieri, Naval Group dub their joint venture ‘Naviris’

    1 novembre 2019 | International, Naval

    Fincantieri, Naval Group dub their joint venture ‘Naviris’

    By: Tom Kington ROME – Italy's Fincantieri and France's Naval Group announced the name of their new naval joint venture will be ‘Naviris' on Wednesday, the day after Fincantieri lashed out at reports that its takeover of French ship yard Chantiers de l'Atlantique faces EU anti-trust opposition. The new name for the JV was announced after a quarterly steering committee meeting of the 50-50 alliance, which was launched in June and is set to be incorporated by year's end. The two state-controlled shipbuilding firms aim to use the joint venture to build and market naval vessels, as well share supply chains, research and testing. As part of the deal, France is using an Italian design for its new logistics vessel, while the two yards will work together on upgrading the Horizon frigates jointly built by Italy and France and operated by both countries. There are also plans for the JV to work on a new European Patrol Corvette. The two yards have promoted the JV as a way to create synergies in Europe's fractured naval industry to allow it to compete globally, and it came on the heels of Fincantieri's takeover of France's Chantiers de l'Atlantique shipyard — a deal which will allow the two yards to share work on cruise ships. This month the drive for more synergy appeared be bearing fruit when Fincantieri said that it would be building forward sections for the new French logistics ships. The four vessels, part of the FLOTLOG (Flotte logistique) program, which are based on the Italian Vulcano design, are being built by a temporary consortium between Chantiers de l'Atlantique and Naval Group. Fincantieri said it would build the sections at its Castellammare di Stabia shipyard in southern Italy, with deliveries to Chantiers de l'Atlantique, which it controls, scheduled between 2021 and 2027. The only potential hitch to the cross-border cooperation is the European Union, which is studying the Fincantieri takeover of Chantiers de l'Atlantique for anti-trust violations, and has yet to give a green light. On Tuesday Fincantieri attacked press reports suggesting the anti-trust probe had been extended, claiming it “strongly disapproves of such rumors, which have also negatively affected its share price today.” In a statement, Fincantieri said that if the rumors were true, it would “firmly” disapprove of such a decision by the EU. The company challenged reports that the deal would cut the number of cruise ship builders in Europe to two, claiming the real number would be three. Correction: This story was updated on Nov. 1 to correct the name of the new joint venture. https://www.defensenews.com/global/europe/2019/10/31/fincantieri-naval-group-dub-their-joint-venture-navaris

  • What’s changing in the cyber domain? We ask industry experts

    3 septembre 2019 | International, Sécurité

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

Toutes les nouvelles