News

This exclusive interview offers an insight into the future of counter-explosive ordnance (EOD) operations through the eyes of Major Mark Fetters, the British Army’s Future Counter-Explosive Ordnance ...
Reach Defence professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the ...
After a long hiatus, hypersonic missile research and development is back in full swing. Now, a global hypersonic arms race is underway, challenging geopolitical order and undermining existing ...
Broad and rapid advancements in neuroscience and its technologies (i.e.- neuroS/T) have prompted renewed and growing interest in and use of these tools and methods to exert influence and power on the ...
Cruise missiles have gained a vital role in today’s conflicts due to their precision, speed and versatility. They have the ability to be launched from air, land, sea and subsea, which makes them vital ...
How did Isreal become a cybersecurity superpower? An often overlooked element of the Syrian War is the cyber war. Russia has been deeply engaged in this area, utilising cyber tools as operational ...
Some NATO land forces, such as the British Army, have been geared to combat counterinsurgency operations with light forces in relatively close quarters. The focus needs to re-centre on the ability to ...
In 2017, Saudi Arabia was the third highest military spender, increasing expenditure by 9.2 per cent to $69.4 billion — 10 per cent of its GDP. As part of Saudi Vision 2030, the nation is aiming to ...
The technology behind unmanned air systems (UAS) has taken off in recent years and as a result UAS can fly faster and further than ever before – performing ever more sophisticated surveillance ...
Drones represent a new challenge for the counter-terror and counter-biological weapons community. They can be deployed to delivery and disseminate biological and ...
Impressive technology innovation in cybersecurity is significantly improving network and information protection. It is essential in an increasingly complex threat environment characterized as an ...