24 décembre 2023 | International, Sécurité

US unveils international force to defend Red Sea. Here’s what we know.

Several nations have announced their contributions to Operation Prosperity Guardian, a new multinational security initiative in the Middle East.

https://www.c4isrnet.com/naval/2023/12/19/us-unveils-international-force-to-defend-red-sea-heres-what-we-know/

Sur le même sujet

  • Safran Helicopter Engines extends contract with RUAG

    17 juin 2020 | International, Aérospatial

    Safran Helicopter Engines extends contract with RUAG

    June 15, 2020 - RUAG carries out regular maintenance work on the Super Puma helicopters and its components. In addition to the Swiss Air Force, customers include foreign military units and civilian clients. The twin-engine Super Puma is powered by the Makila 1A1, manufactured by Safran Helicopter Engines, the world's leading manufacturer of helicopter engines. It offers the widest range of helicopter turboshafts in the world and has more than 2,500 customers in 155 countries. In order to ensure the reliability of the engines, regular maintenance work is essential. RUAG is one of the world's leading service providers for the Super Puma helicopter type. With over 60 years of experience, RUAG delivers added value to the safety and performance of selected civil and military helicopters. The close cooperation between RUAG and Safran Helicopter Engines has existed for many years. As an original equipment manufacturer (OEM) approved service centre, RUAG's Lodrino site regularly processes fuel control units for Makila 1A1 engines. The contract between the engine manufacturer and RUAG has now been extended for the existing year and the upcoming year 2021. RUAG maintains close and long-term relationships with various OEMs. This enables RUAG to guarantee a constant availability of resources to provide high-quality services. «We appreciate the reliable and transparent cooperation with Safran Helicopter Engines», explains Max Grob, Business Development Manager Propeller Aircraft & UAV, RUAG Ltd. «Such partnerships help us to continuously expand our know-how and ensure our performance and reliability towards the Swiss Air Force and other customers». For more information about the product, contact Ercole Minieri, Teamleader Commercial Propeller Aircraft & UAV, e-mail Ercole.minieri@ruag.ch / mobile +41 76 380 93 31 For more information about RUAG, contact Kirsten Hammerich, Senior Media Relations Manager, e-mail Kirsten.hammerich@ruag.ch / mobile +41 79 770 81 18 View source version on RUAG : https://www.ruag.com/en/news/safran-helicopter-engines-extends-contract-ruag

  • Raytheon Technologies awarded $237 million counter-UAS contract

    20 avril 2023 | International, C4ISR

    Raytheon Technologies awarded $237 million counter-UAS contract

    Tucson, Ariz., April 19, 2023 /PRNewswire/ -- Raytheon Technologies (NYSE: RTX) was awarded a $237 million U.S. Army contract for Ku-band Radio Frequency Sensors (KuRFS) and Coyote? effectors to detect...

  • In chaos, there’s opportunity … and that’s bad news

    27 avril 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    In chaos, there’s opportunity … and that’s bad news

    James Yeager This year is only four months old and it's already one for the history books — and not in a great way. As the defense community works in tandem with the broader government to keep citizens safe and healthy, cybersecurity threats are only becoming more aggressive. If we've learned anything about cyber adversaries, it's that they will seize on any opportunity to gain an advantage in targeting their victims, including exploiting the fears of the public during a global pandemic. As COVID-19 has moved from the East to the West, adversaries have followed suit, using lures that play into people's desperation for information on the disease. In “The Art of War,” Sun-Tzu said“In the midst of chaos, there is also opportunity.” The COVID-19 virus is infecting more than just people. The pandemic has created chaos and handed adversaries an irresistible opportunity to exploit the situation to gain entry into our networks, whether that's to steal intellectual property, disrupt operations, or gain a strategic advantage if they are a nation-state actor. Already, we are seeing an increase in phishing campaigns using COVID-19 as a hook to launch malware in emails disguised as alerts. Particularly vulnerable are the thousands of remote workers — government employees and contractors alike — who are using their own home networks, which are largely less sophisticated and secure than their work environments. The stakes are high, particularly for those in defense jobs, where an errant click can have devastating consequences. Coincidently, 2020 is the year when the DoD's Cybersecurity Maturity Model Certification has grown teeth and will force more than 300,000 defense contractors to up their cybersecurity game or face bottom-line consequences. Now is not the time to make mistakes. In CrowdStrike's recent Global Threat Report, we captured and analyzed real-world inputs from observed trends in cyber-attacks on commercial and government enterprises. The following are some of the notable attack vectors and trends we observed across the public sector during 2019: An escalation in ransom demands, including ransomware attacks on defense supply chain providers, schools and local municipalities. Surpassing the volume of malware attacks are malware-free attacks that use code which executes from memory or stolen login credentials. Continued state-sponsored targeted intrusions aimed at the government and defense sector. In fact, we have witnessed adversaries exploiting fear around COVID-19 to socially engineer their way to user credentials and sensitive data. In the months ahead, I contend we'll see many more of the same tactics from the same bad actors: Russia, China and newer players on the block, such as Iran, which has leveraged U.S. social media platforms to develop information operations campaigns. Amidst massive change, periodic chaos and long-term disruption, the defense community — government and industry — must put a premium on speed. Speed to detect. Speed to investigate. Speed to mitigate. We recommend that agencies and companies implement cybersecurity practices that follow the 1-10-60 Rule: detect intrusions within 1 minute; investigate and gain a comprehensive understanding of the attack within 10 minutes; and contain and remove the threatening adversary from the network within 60 minutes. This benchmark will limit the damage caused by inevitable attacks. Yes, inevitable. Cyberattacks are a constant and while building a bigger, wider and thicker wall may help keep bad actors out, they are persistent and determined enough to eventually get in, and when they do, you're on the clock. This year will only get worse as the impacts of COVID-19 will be deep, damaging and long-lasting. We're all faced with loss and uncertainty as we attempt to recover from the global pandemic. For the defense community, there is no time to recover and regroup. You are already on the clock, as those who wish to do our nation harm are already hard at work. https://www.fifthdomain.com/opinion/2020/04/24/in-chaos-theres-opportunity-and-thats-bad-news/

Toutes les nouvelles