The insightful articles, inspiring narrations and analytical perspectives presented by the Editorial Team, establish an alluring connect with the reader. My compliments and best wishes to SP Guide Publications.
"Over the past 60 years, the growth of SP Guide Publications has mirrored the rising stature of Indian Navy. Its well-researched and informative magazines on Defence and Aerospace sector have served to shape an educated opinion of our military personnel, policy makers and the public alike. I wish SP's Publication team continued success, fair winds and following seas in all future endeavour!"
Since, its inception in 1964, SP Guide Publications has consistently demonstrated commitment to high-quality journalism in the aerospace and defence sectors, earning a well-deserved reputation as Asia's largest media house in this domain. I wish SP Guide Publications continued success in its pursuit of excellence.
In recent months the Israel Aerospace Industries (IAI) has increased its cyber defence-related activities. Esti Peshin, director of the company’s cyber section and a veteran of the IDF’s hush-hush sigint Unit 8200, has been quoted that IAI is now developing solutions for clients in Israel and abroad.
The cyber section, based at the IAI subsidiary Elta, was launched in August 2013. “We have a national responsibility to be independent in this area. Israeli defence industries have to take lead role. We have the infrastructure and platforms to take the lead.”
Peshin told The Turkish Weekly that Israel’s – and other countries’ — critical networks were vulnerable even if not linked to the Internet. “A disk-on-key can be given to an employee, who then plugs it into a system. It can broadcast information. It takes less than 30 seconds for a disk-on-key to go through all of the contents of a computer.”
Peshin warned that cyber threats have become more substantial, and that a competent and well-organised attacker can bring a country to a standstill, shutting off its power grid and traffic lights, or paralysing an airport. Such cyber attacks can be launched without the perpetrator being traced, thus making effective deterrence impossible.