Countering the evolving cyber threat (sponsored)
This video is brought to you by Viasat
With every passing minute, a growing number of hostile forces attempt to hack the proprietary and classified information of governments, militaries, businesses, and even individuals. These attacks are circumventing traditional perimeter protection and leveraging vulnerabilities in remote connections and open source technologies to exploit sensitive data.
More from Five Eyes Connectivity Special Report
-
Podcast: Five Eyes Connectivity - Canada
In this episode of the Five Eyes Connectivity podcast, we look at the unique situation faced by Canada and how its military is responding to a rapidly changing world.
-
Podcast: Five Eyes Connectivity - Australia and New Zealand
In this episode of the Five Eyes Connectivity podcast, we hear how two of the smaller militaries in the Five Eyes alliance – Australia and New Zealand – are responding to a rapidly-changing world.
-
Podcast: Five Eyes Connectivity - The United Kingdom
In this episode of the Five Eyes Connectivity podcast, we hear how a rapidly shifting threat environment is driving a transformation of British military capabilities.
-
Podcast: Five Eyes Connectivity - The United States
In this episode of the Five Eyes Connectivity podcast, we dive into the connectivity issues facing the US military and its further development of the Multi-Domain Operations concept.
-
Australian CHORUS is on song
The Australian Department of Defence announced on 11 May that it is exploring ways to integrate laser-based optical and RF communication technologies onto a single …
-
Tactical data link provider expects major new order this month
Looking to the future of the Multifunctional Informational Distribution System Joint Tactical Radio System (MIDS JTRS), BAE Systems expects an imminent new production contract and …