{"id":2,"date":"2024-07-14T13:40:34","date_gmt":"2024-07-14T13:40:34","guid":{"rendered":"https:\/\/ennova.com.my\/home\/cyber-defence\/?page_id=2"},"modified":"2024-07-19T08:36:58","modified_gmt":"2024-07-19T08:36:58","slug":"home","status":"publish","type":"page","link":"https:\/\/ennova.com.my\/home\/cyber-defence\/","title":{"rendered":"Home"},"content":{"rendered":"<p>The convergence of electronic and cyber warfare refers to the integration of electronic warfare (EW) and cyber warfare capabilities to enhance military operations in the modern battle space. This convergence allows for synergies between traditional EW technologies, which focus on controlling the electromagnetic spectrum, and cyber capabilities, which involve operations in the digital domain. By combining these two types of warfare, military forces can create more comprehensive and sophisticated strategies to defend against and counter adversary electronic and cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The convergence of electronic and cyber warfare refers to the integration of electronic warfare (EW) and cyber warfare capabilities to enhance military operations in the modern battle space. This convergence allows for synergies between traditional EW technologies, which focus on controlling the electromagnetic spectrum, and cyber capabilities, which involve operations [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Home - Cyber Defence<\/title>\n<meta name=\"description\" content=\"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ennova.com.my\/home\/cyber-defence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ennova.com.my\/home\/cyber-defence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Defence\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T08:36:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/\",\"url\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/\",\"name\":\"Home - Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp\",\"datePublished\":\"2024-07-14T13:40:34+00:00\",\"dateModified\":\"2024-07-19T08:36:58+00:00\",\"description\":\"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ennova.com.my\/home\/cyber-defence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage\",\"url\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp\",\"contentUrl\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#website\",\"url\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/\",\"name\":\"Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#organization\",\"name\":\"Ennova Sdn Bhd\",\"url\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/cropped-cropped-logo-1-1.png\",\"contentUrl\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/cropped-cropped-logo-1-1.png\",\"width\":220,\"height\":62,\"caption\":\"Ennova Sdn Bhd\"},\"image\":{\"@id\":\"https:\/\/ennova.com.my\/home\/cyber-defence\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Cyber Defence","description":"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ennova.com.my\/home\/cyber-defence\/","og_locale":"en_US","og_type":"article","og_title":"Home - Cyber Defence","og_description":"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.","og_url":"https:\/\/ennova.com.my\/home\/cyber-defence\/","og_site_name":"Cyber Defence","article_modified_time":"2024-07-19T08:36:58+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/","url":"https:\/\/ennova.com.my\/home\/cyber-defence\/","name":"Home - Cyber Defence","isPartOf":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage"},"image":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage"},"thumbnailUrl":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp","datePublished":"2024-07-14T13:40:34+00:00","dateModified":"2024-07-19T08:36:58+00:00","description":"Bringing Cyber Command and Tactical Level together, creating an efficient cyber war operation with workflow simplifications and automation leveraging on proven latest technology platform.","breadcrumb":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ennova.com.my\/home\/cyber-defence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#primaryimage","url":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp","contentUrl":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/file-jiWh53rSb6dEzkSg1K6S6RTm.webp","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ennova.com.my\/home\/cyber-defence\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#website","url":"https:\/\/ennova.com.my\/home\/cyber-defence\/","name":"Cyber Defence","description":"","publisher":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ennova.com.my\/home\/cyber-defence\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#organization","name":"Ennova Sdn Bhd","url":"https:\/\/ennova.com.my\/home\/cyber-defence\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#\/schema\/logo\/image\/","url":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/cropped-cropped-logo-1-1.png","contentUrl":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-content\/uploads\/sites\/7\/2024\/07\/cropped-cropped-logo-1-1.png","width":220,"height":62,"caption":"Ennova Sdn Bhd"},"image":{"@id":"https:\/\/ennova.com.my\/home\/cyber-defence\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":5,"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/pages\/2\/revisions\/48"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/media\/28"}],"wp:attachment":[{"href":"https:\/\/ennova.com.my\/home\/cyber-defence\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}