NewsTechtechnologyTop Cyberattacks Revealed in New Threat Intelligence ReportDevlin McAllister4 days agoJune 1, 202335We recognize that in today's world, security leaders must expand their focus beyond technologies and their vulnerabilities. To effectively manage...
DefenseMilitary AffairsNewsU.S.For command post survival, U.S Army wants more mobility and concealmentGeoffrey Wallace2 weeks agoMay 19, 202347WASHINGTON — The U.S. Army wants to make its command posts nimbler and more easily concealable to survive intense, widespread...
ExtremismOpinionTechtechnologyExtremist NFTs: How Does Blockchain Immortalise Extremism?Michael Becker2 months agoApril 20, 202361Introduction Blockchain allows users to preserve unique art, games, and photographs. One of the famous examples is the art collection...
FeaturedInternal SecurityWagner Group and the Evolving Global Threat of Private Military CompaniesGeoffrey Wallace2 months agoApril 19, 202382Amid the rise of great power competition, Russia and China, near peer competitors to the United States, have been working...
EuropeInternal SecurityNewsRussian spies more effective than army, say expertsDevlin McAllister2 months agoApril 9, 202388Russia's security and intelligence services have achieved greater success in Ukraine than its army, says a leading UK defence think...
DefenseEuropeInternal SecurityPolicy papersPolitial AffairsPublicationsRealising the EU Hybrid Toolbox: Opportunities and PitfallsKenneth Lasoen4 months agoFebruary 3, 2023272In recent years European and other nations have been increasingly targeted by different manipulation or coercion tactics that remain under...
EuropeInternal SecurityPolitial AffairsEurope awakens to the threat of sabotage by Russian agentsGeoffrey Wallace5 months agoFebruary 3, 2023109Suspicion has fallen on Russia over a series of confirmed or apparent acts of sabotage and espionage that took place...