Cybersecurity and cyber warfare

13 posts

CDS and DM img Sept 2024

Launch of the CAF Cyber Command

Message from CDS and DM, 26 September 2024 A New Era for the Cyber Domain: Launch of the CAF Cyber Command — Originally published by: The Maple Leaf Today, we […]

Share

The Use of AI by Canada’s Armed Forces

By Jeff G. Gilmour, 5 August 2024 As noted in a recent article in The Economist magazine, the character of warfare is about to be profoundly changed by artificial intelligence (AI).1 In […]

Share

New CAF Digital Services Group

By Moderator, 6 May 2024 On 1 May, DND/CAF announced that it was integrating two digital service organizations – the Digital Transformation Office (DTO) and the Chief Information Officer Group […]

Share

Hack/Counter-hack

By Dr. Ann Griffiths, 8 December 2021 Government agencies in both Canada and the United States have both acknowledged publicly for the first time that they are targeting the hackers […]

Share

Are We Ready for Cyber-Attacks?

By Dr. Ann Griffiths, 4 November 2021 We’ve all watched with horror – mixed with anger – the fallout from the cyber-attack on the health care system in Newfoundland and […]

Share
Cyber report GAO-19-128

Cybersecurity in Weapon Systems

Old Sailor, 21 November 2020. In late 2018 United States (U.S.) Government Accountability Office (GAO) produced an interesting report on cybersecurity in U.S. DOD Weapon Systems. It’s relevant to the […]

Share
CNR RCMI post

Automation, Autonomy, and Subsea Warfare

Konrad Mech, 14 August 2020 Some readers may be interested in an article I wrote, recently published in SITREP, the Journal of the Royal Canadian Military Institute, titled “Automation, Autonomy, […]

Share

Cybersecurity in defence procurement

Moderator, 8 March 2020. The United States is trying to address the cybersecurity shortcomings in its defence procurement. It’s concerning not only U.S. Department of Defense [https://www.defense.gov/], but also defence […]

Share

Hacking in the Marine World

25 April 2017. We hear a lot about hacking these days, and security/defense organizations are undoubtedly concerned about the potential for serious breaches of their networked systems. But what about […]

Share