Cyber-Coercion Must Be Fought with a Comprehensive National Strategy

04/25/2021
By Bernard Barbier, Jean-Louis Gergorin and Admiral Edourd Guillaud “Cyber-coercion” calls for putting together intelligence, protection, international action and retaliation capabilities, three former senior national security officials point out. Op-ed. At the beginning of the year 2020, in a world that was yet to imagine how much it would be…

China and Cyber Theft

12/12/2019
Debalina Ghoshal Cyber theft committed by China is not new and the country continues to violate commitment that it had made with the United States that it would not indulge in any cyber thefts. These thefts not only include intellectual properties but also crucial weapon systems to name a few…

Remembering Tommy Flowers: The Inventor of the Programmable Computer and Making a Key Contribution to a War Winning Approach

12/16/2018
The Bletchley story is a fascinating one. But no story within that overall story is more intriguing than that of Tommy Flowers. Here was a man who believed that one could build a programmable computer; and he invested his own money to make this vision happen with very little support…

Leveraging Mobile Security: How To Shape a Way Ahead for a 5th Generation Military

09/23/2018
By Robbin Laird In my discussions at Penten, I learned of a very innovative approach to providing for the security for mobile systems.  They have developed an approach which allows the user to connect with a variety of security systems through a very innovative USB device which allows a mobile…