Defense Technology Solutions

Explore top LinkedIn content from expert professionals.

  • View profile for Sean Connelly🦉
    Sean Connelly🦉 Sean Connelly🦉 is an Influencer

    Zscaler | Fmr CISA - Zero Trust Director & TIC Program Manager | NIST 800-207 ZTA co-author

    22,282 followers

    🚨CISA Releases Guidance on Modern Approaches to Network Security🚨 The Cybersecurity and Infrastructure Security Agency (CISA), America's Cyber Defense Agency, and several partners have just released a comprehensive guide on modern approaches to network access security. This report emphasizes the limitations and vulnerabilities of traditional VPN solutions and advocates for adopting more robust and fine-grained security models like Secure Access Service Edge (SASE) and Secure Service Edge (SSE). Key Takeaways: 🔹 VPN Challenges: VPNs are prone to limitations while providing encrypted tunnels for remote access. These issues can expose organizations to significant risks and breaches. 🔹 Value of SASE & SSE: SASE and SSE focus on secure access to web services and applications, combining capabilities like Zero Trust Network Access, secure web gateways, and cloud access security brokers, ensuring all access is continuously verified. Together, they streamline security policies and offer seamless, secure access to data across hybrid environments. 🌐🔒 🔹 Implement Network Segmentation: Network segmentation is crucial for limiting the spread of attacks within an organization. Organizations can contain potential breaches and minimize the impact on critical systems by dividing the network into smaller, isolated segments. 🔀 🔹 Validate Vulnerability Scans on All Public-Facing Enterprise Assets: Regular vulnerability scans on public-facing assets are essential to identify and remediate potential security gaps. Ensuring that these scans are thorough and validated helps maintain a robust security posture and protects against external threats. 🛡️ Organizations transitioning from traditional VPNs to modern network access solutions can significantly benefit from the strategies and best practices outlined in this guide. Implementing these modern approaches strengthens security and aligns with Zero Trust principles, ensuring a more secure and resilient infrastructure. (Full disclosure: I participated in initial discussions about this guidance before leaving CISA earlier this year. Having been in the networking space for almost 30 years, this type of guidance is critical to help shape discussions on how network security is evolving and supports a Zero Trust mindset in new ways). #ZeroTrust #Technology #CloudComputing #SoftwareEngineering

  • View profile for Josef José Kadlec

    Co-Founder at GoodCall | 🦾HR Tech - AI - RecOps - Talent Sourcing - Linkedln | 🪖Defence, Dual-use & MilTech Industry Consultant+Investor 🎤Keynote Speaker 📚Bestselling Author 🏆 Fastest Growing by Financial Times

    47,613 followers

    💡 From Steel to Software: How Weapons Have Become Code-Driven Modern missile systems are no longer defined primarily by propulsion or aerodynamics — but by code. What was once a mechanical or chemical challenge has evolved into a software-defined system, where autonomy, guidance, and decision-making are increasingly driven by embedded algorithms. A “self-controlled” missile today integrates several layers of computational intelligence: - Inertial Navigation and Kalman Filtering for sensor fusion and drift correction. - Computer Vision and Target Recognition using convolutional or transformer-based neural networks. - Adaptive Guidance Laws that use reinforcement learning or real-time optimization to adjust trajectories dynamically. - Mission Management Software that executes conditional logic — deciding, for example, when to re-target, abort, or engage under uncertain data. These systems blur the line between mechanical engineering and autonomous robotics — and between civil and military innovation. The same AI models that enable autonomous vehicles, satellite tracking, or industrial inspection can be repurposed for target identification and dynamic flight control. This is the essence of dual-use technology: innovations born in commercial domains that can rapidly migrate into military contexts through software transfer, not physical manufacturing. This shift transforms defense R&D itself. The critical advantage is no longer only in materials or payloads, but in algorithmic superiority — speed of adaptation, data integration, and software reliability under extreme conditions. As weapons systems become code-centric, the challenge for policymakers, engineers, and ethicists alike is ensuring responsible autonomy — where control, accountability, and safety are not lost in the abstraction of software. In the age of algorithmic warfare, the sharpest edge is no longer steel — it’s software. #Defence #Miltech #Defense #DefenseTechnology #AutonomousSystems #DualUse #AIinWarfare #GuidanceSystems #SoftwareDefinedWeapons #EthicalAI #InnovationSecurity

  • View profile for Paulo Dominonni

    Brazil Defense Industrial Entry Architect | Multi-Level Acquisition Strategy (Federal, State & Municipal) | Licensed Military Vehicle Production & Institutional Structuring for Global OEMs

    9,399 followers

    I’m thrilled to share this insightful article on GM Defense’s innovative family of light tactical vehicles (LTVs), centered around the Infantry Squad Vehicle (ISV). As someone closely following advancements in defense mobility solutions, I’m impressed by how GM Defense leverages General Motors’ commercial expertise to deliver a scalable, versatile, and mission-ready platform for modern militaries. The ISV family’s design, rooted in the Chevrolet Colorado ZR2 platform, brilliantly balances commercial off-the-shelf (COTS) components with purpose-built tactical enhancements. The use of the Duramax 2.8L turbo diesel engine, paired with Chevrolet Performance parts, ensures robust off-road capability and responsive power, critical for complex terrains. The emphasis on transportability—via C-17, C-130, or even UH-60 Blackhawk sling load—demonstrates a deep understanding of expeditionary requirements. Additionally, the integration of safety features like rollover protection and electronic stability control showcases a commitment to operator safety, which is paramount in high-stakes environments. The scalability of the ISV family, supported by GM’s global supply chain and countries, is a game-changer. This infrastructure not only facilitates rapid production but also ensures sustainment in austere environments—a critical factor for long-term operational success. The adaptability of the platform to support diverse mission profiles, from counter-UAS to casualty evacuation, positions GM Defense as a leader in meeting evolving defense needs. GM Defense’s ISV family exemplifies how commercial innovation can be harnessed to deliver cutting-edge defense solutions. Its combination of mobility, adaptability, and global support makes it a compelling option for militaries seeking agile, reliable platforms. I’m excited to see how GM Defense continues to evolve this family to address the challenges of tomorrow’s battlefield. What are your thoughts on the ISV’s potential to reshape tactical mobility? Are there other features or integrations you’d like to see in future iterations? Let’s discuss! Paulo Dominonni https://lnkd.in/dVh7U63K

  • View profile for Pierre VANDIER

    NATO Supreme Allied Commander Transformation |

    49,142 followers

    During a 24-hour visit to the Kennedy Space Center, Cape Canaveral, I had the opportunity to engage NASA - National Aeronautics and Space Administration , industry and the US Space Force to explore the deep transformation currently reshaping the space domain in the United States. Several key insights stood out: 🔹LEO constellations: with more than 15,000 satellites soon in orbit (Starlink, Kuiper, one web), military communications are being reshaped through faster collaboration with industry to keep pace with innovation. 🔹Space observation: commercial players (Pléiades, Maxar, PlanetLab) are now able to provide “on-demand” imagery, enhanced by AI-based recognition. 🔹New technological paradigms: reusable launchers, cost-effective commercial-grade electronics, and in-orbit servicing are redefining the economics and lifecycle of space systems, also about the inner processes of the federal and military actors. 🔹Civil-military convergence: the traditional boundaries are shifting, with defense now benefiting from rapid civilian innovation cycles. Our Alliance is engaging with this new space ecosystem, and is learning from its deep transformation for the benefit of our multi-domain focused purpose. For NATO this commercial-civil-military convergence is a strategic opening: to accelerate innovation, strengthen resilience, and co-develop with transatlantic industry a truly dual-use framework. Looking forward, this means: 🔹Making NATO a platform where commercial and military space actors cooperate seamlessly, 🔹Creating resilient architectures that are inherently transatlantic and interoperable, 🔹Ensuring that the Alliance remains at the forefront of technological and operational transformation in space, harnessing the full potential of space services, 🔹Developing federated approaches to ensure free and resilient access to space. This visit reinforced my conviction that space is a decisive and strategic domain for NATO’s credibility, adaptability, and effectiveness, as well as a source of transformation and innovation for the benefit of our Alliance in the years ahead. NATO Allied Command Transformation (ACT)

    • +1
  • View profile for Jason Makevich, CISSP

    Founder & CEO of PORT1 & Greenlight Cyber | Keynote Speaker on Cybersecurity | Inc. 5000 Entrepreneur | Driving Innovative Cybersecurity Solutions for MSPs & SMBs

    8,302 followers

    Traditional cybersecurity strategies like firewalls and antivirus are no longer enough to protect against today's evolving threats. It’s time for a new approach. Here’s why: → The Perimeter is Gone Remote work and advanced persistent threats (APTs) have blurred the lines between inside and outside the network. Traditional perimeter defenses can’t keep up. → Non-Malware Attacks are on the Rise Cybercriminals are using social engineering and phishing to infiltrate systems, bypassing traditional defenses. We need smarter, more proactive detection. → Zero Trust is the Future "Never trust, always verify." Zero Trust models continuously authenticate users, limit access, and reduce internal breaches. → AI & Machine Learning: The Game Changers AI and ML enhance threat detection, automate responses, and analyze user behavior to uncover hidden risks before they escalate. → SASE for Modern Workforces With Secure Access Service Edge (SASE), security and networking come together in the cloud, ensuring consistent protection across all environments. The landscape of cyber threats is changing fast—your defense strategies need to change with it. How is your organization evolving its cybersecurity playbook? Let’s discuss. 🔐

  • View profile for Matt Meeks

    Co-Founder & Chief Growth Officer @ Elanah.AI | Building AI-Enabled Readiness Infrastructure for Defense

    5,295 followers

    FY2026 Signals Joint Defense Tech The Pentagon isn’t looking for more tech. It’s looking for tech that fits the fight. What wins? interoperable, multi-domain, coalition-ready tech that aligns with how the U.S. and its allies will fight. Hear me out… 1. Integration Is the Mission PE 0604826J is the COG for CJADC2. It funds interoperability pilots with NATO, secure data sharing across services, and cross-domain C2 experiments like Bold Quest. Your tech needs to plug into this joint ecosystem. 2. Multi-Domain C2 Is Non-Negotiable The budget holds firm on digital datalinks, secure comms, and allied data exchange. Your tech must talk across domains and allies, don’t expect traction. 3. Rapid Prototyping Isn’t Dead—It’s Evolving RDER may be gone, but its intent lives on. The budget still backs prototypes that can shape joint force design. Demo utility in a joint context and watch your TRL skyrocket. 4. Congress ‘All In on Joint Tech’ is a buying signal. • $400M → Joint Fires Network • $400M → Joint battle management tools • $1B → Accelerated tech fielding • $2B → DIU scaling commercial tech 5. AI/ML, Autonomy, C5ISR—Joint prioritization isn’t just lip service. Budget lines explicitly call out: • Multi-service unmanned systems • Maritime robotics • Coalition-ready EW and ISR

  • View profile for Kateryna Bondar

    AI in defense, International security, Emerging tech

    5,142 followers

    Wondering how to integrate commercial technology into the military? Read about the case of Ukraine in my new report. Instead of relying on slow-moving, state-run defense R&D, Ukraine has turned to the commercial sector—startups, civilian engineers, and private companies—to deliver battlefield-ready technology now. This shift has shattered procurement bottlenecks, slashing acquisition timelines from years to months (or even weeks for unmanned systems). Military units can now directly procure what works best for them, rather than waiting for top-down solutions. Key takeaways from the report: ❗️Commercial-first military innovation: Ukraine has moved from a state-controlled R&D model to integrating civilian tech directly into combat operations. ❗️Battlefield-driven procurement: Instead of speculative long-term projects, weapons and tech are now developed based on real-time operational needs. ❗️Rapid acquisition cycles: Testing, approval, and deployment timelines have been cut from years to months, or even weeks in some cases. ❗️Decentralized decision-making: Military units can directly acquire the technology they need, ensuring flexibility and faster adaptation on the front lines. ❗️Competitive advantage through commercial tech: Off-the-shelf solutions reduce development costs and risks while increasing efficiency on the battlefield. Read the full report here: https://lnkd.in/er5DfN_s The question is: Will Western defense establishments follow suit—or will they cling to outdated models while adversaries adapt faster? #DefenseInnovation #MilitaryTech #Ukraine #AI #UnmannedSystems #ProcurementReform #AcqusitionReform

  • View profile for William Treseder

    Cofounder, Stealth Startup, BMNT | Reserve Marine | Startup NCO

    15,370 followers

    Super tactical playbook for defense tech companies who are building products (and gaining traction) through testing & experimentation events. These are gleaned from several decades of ⚓ experience from Jason Galvan, Robert Leonard, and Jason Knudson (all incredible colleagues at BMNT). Bottom line: experimentation, done well, can be an accelerant for any capability and the business providing that capability. Dos - Figure out what else you want besides money. These events are a place where you can receive those non-monetary resources. - Focus on learning how your capability performs in a realistic environment. They tend to fail due to friction (e.g. interfaces, logistics) not the lack of features. - Pay attention to the operators. They will surprise you with how they end up using the tool. - Have a Plan B. S#it will always happen. Be ready with a back up. - Prepare for a second wave of experiments. There is almost always another opportunity at the same event. Get there early and stay late. You're already there! - Attend the preparatory planning calls. This will set you apart from the folks who just show up. Don'ts - Don't forget to bring your technical folks. Ideally you'll be making tweaks in real-time. - Don't try to avoid failure. Operators want to see you push past the point of failure to see what your capability can really do. These events are judged different than ones where you're talking to acquisitions folks. - Don't be proprietary. It takes a village to deter our adversaries. You better be prepared to work well with others. - Don't go to an event only one time. If it's worth going to, it's worth going at least two years in a row to figure out how to get the most out of it. - Don't forget to do all the paperwork. You won't be let in without it. - Don't delegate the handling of paperwork. Companies get rejected all the time for giving incomplete or unsatisfactory answers. The more you know... 🇺🇸 #testing #experimentation #warfighting #strategy #defensetech #dualuse #bestpractices #lessonslearned

  • View profile for Ofer Shmueli

    Founder | Defense Beacon | Business Growth & Strategic Advisor| Competitive Intelligence Expert| Defense Industry Specialist. Visit our website. defensebeacon.tech 🌐

    3,776 followers

    As a Defense Beacon client, be the first to know! The British Army’s Experimentation and Trials Group (#ETG) is advancing uncrewed aerial systems (UAS) at the tactical level on the Salisbury Plain Training Area, emphasizing a concept known as the recce-strike complex. This initiative aims to enhance the speed and precision of target identification and engagement. To support the modernization of British forces, ETG is testing advanced technologies, including Rafael Advanced Defense Systems Spike Firefly (Picture Below). This loitering munition can remain undetected over targets, significantly improving intelligence gathering and engagement capabilities. Additionally, the FPV S1 Strike UAS and DefendTex D40 provide real-time surveillance for company-sized formations, positioning British forces to leverage integrated reconnaissance and strike capabilities for future engagements. Defense Beacon analyst team notes that this is not the first time Israeli-made tactical loitering munitions have been tested by the British Army. Several months ago, we reported on demonstrations and trials conducted by the British Army with the Rotem-L Loitering munition developed by IAI - Israel Aerospace Industries. 🔑 Key Considerations for the Recce-Strike Complex. For successful implementation of the recce-strike complex, which embodies a sensor-to-shooter concept, several technological integrations are crucial: 🖥️Tactical BMS/C2 Capabilities: These must be integrated with secure, continuous, and reliable Mesh Network communication, especially in environments where GPS/GNSS may be denied. 🧠AI-Driven Autonomous Capabilities: Incorporating AI-driven capabilities presents a challenge for the British Army due to existing "battle engagement rules," which necessitate a "man in the loop" approach. 🛰️ Alternative Navigation Capabilities: There is a need for integration of alternative navigation capabilities that do not rely on technologies that can be jammed, ensuring operational effectiveness in denied environments. 🎯AI/ML-Based Automatic Target Recognition (ATR): Effective identification of enemy targets in complex operational environments is essential for operational success. Defense Beacon Consultancy is specialized in providing competitive intelligence and strategic insights for defense industry clients. To explore how we can support your strategic needs, feel free to reach out to us here or visit our website defensebeacon.tech 🌐 #uncrewed,#UAS,#strike, #Loitering, #Munition, #FPV, #D40,#Spike, #Firefly, #reconnaissance, #Network ,#communication, #GPS, #GNSS,#ATR

  • View profile for Lex Crumpton

    Principal Cybersecurity Engineer - Threat-Informed Defense | GCIH

    4,378 followers

    🔐 Unifying Tactical & Strategic Defense with MITRE ATT&CK🔐 Cyber defense isn’t just about reacting to threats—it’s about anticipating, preventing, and adapting. To stay ahead of adversaries, organizations must integrate both tactical and strategic defensive approaches with real-world defensive strategies. But how do these concepts fit together? 📌 Tactical vs. Strategic Defensive Approaches ✅ Tactical Defense (Real-Time) – Focuses on immediate threat response, using known indicators (IOCs), signature-based detections, and automated alerts. ➡️ Example: Detecting brute-force attempts (T1110 - Brute Force) with SIEM alerts. ✅ Strategic Defense (Proactive) – Aims to identify threats before they materialize, leveraging behavioral analytics, anomaly detection, and adversary emulation. ➡️ Example: Threat hunting for unusual account enumeration (T1087 - Account Discovery) before an adversary escalates access. 🔗 Both are necessary—Tactical defense reacts to active threats, while Strategic defense prepares for evolving threats. 📌 Defensive Strategies: Bridging the Gap Defensive Strategies turn approaches into action by implementing: 🔹 Threat-Informed Defense – Using ATT&CK to map adversary TTPs to detections & mitigations. Some really cool projects that do this is under Center for Threat-Informed Defense. 🔹 Proactive Threat Hunting – Identifying adversary behaviors before an attack unfolds. 🔹 Behavior-Based Detection – Leveraging ATT&CK analytics and data sources to detect anomalous patterns that evade signature-based defenses. 🔹 Adversary Emulation – Using tools like MITRE Caldera, ATT&CK Evaluations, Atomic Red Team to test & refine detections. 🔹 Adversary Deception – Using tools like MITRE Engage; Deploying honeypots, fake credentials, and decoy infrastructure to mislead, detect, and slow adversaries. 🚀 How ATT&CK Helps MITRE ATT&CK can be the glue that connects approaches to strategies: 📌 Tactical Defense: ATT&CK techniques inform real-time SIEM rules & detections. 📌 Strategic Defense: ATT&CK TTPs & analytics support long-term adversary tracking & mitigation. 📌 Defensive Strategies: ATT&CK mitigations map to Zero Trust, network segmentation, & endpoint security. Are you using ATT&CK to bridge the gap between real-time defense and proactive security? Let’s discuss! ⬇️ #CyberDefense #MITREATTACK #ThreatHunting #DetectionEngineering #ProactiveSecurity #ZeroTrust #AdversaryDeception #AdversaryEmulation #ThreatIntelligence

Explore categories