Secure By Design: Formal methods for an insecure world
In January of this year, four U.S. government agencies - the Cybersecurity and Infrastructure Security Agency (CISA), the Defense Advanced…
In January of this year, four U.S. government agencies - the Cybersecurity and Infrastructure Security Agency (CISA), the Defense Advanced…
Artificial intelligence (AI) continues to be a key battleground technology – leading suppliers such as BAE, Lockheed Martin, and Thales…
The Leidos AUKUS Purple Paper on Hypersonics discusses the role of the AUKUS alliance in advancing hypersonic capabilities, focusing on…
The C-UAS sector is experiencing significant advancements driven by emerging technologies and the growing use of drones in conflict, such…
Traditional networks reliant on satellites or internet infrastructure, while effective, can be vulnerable to disruption. High-frequency (HF) radio communication, equipped…
Africa's diverse environments present significant challenges for long-distance communications technologies. Spanning vast deserts, dense forests, and mountainous regions, the continent's…
Electronic warfare (EW) is transforming rapidly and leading aerospace and defence contractors are investing in offensive and defensive capabilities to…
Following two and a half years of conflict, one of the major impacts of Russia's invasion of Ukraine has been…
In 1896, gold miners hit the jackpot in Western Australia. Mining projects brought residents to the area, and the town…
Defence budgets play a significant role in shaping the geopolitical environment and influencing investment in unmanned aerial systems/vehicles (UAS/V) mitigation…