GOVERNMENT > Defence


« Back to News

2025-04-04

President Trump Fires National Security Agency Chief

Trump has fired three National Security Council officials since his inauguration, expressing dissatisfaction with the US security apparatus.

2025-04-02

China Presents The Top Cyber & Military Challenge

No Surprise: China is the top military & cyber threat to the United States, according to a new report by The Office of National US Intelligence.

2025-04-01

Q-Day Could Lead To Hacking Nuclear Weapons

How soon will progress in quantum computing cross a threshold which will allow hacking of all existing online platforms, including nuclear weapons?

2025-03-30

Britain's Armed Forces Fast-Track New Digital Recruits

As risk levels rise, fast-tracked recruits are entering a rapidly evolving sector, while the IT landscape becomes more challenging. By Richard Giblin

2025-03-18

Geopolitics, Nation-State Hackers & Cyberwar

As geopolitical tensions are rising, state-sponsored hackers are intensifying their efforts, targeting defence & government institutions.

2025-02-24

Iran Deploys AI - Guided Missiles & Drones

The use of AI in missile technology has the potential to shift military power balances in the M. East, as Iran advances its missile development.

2025-02-18

Ukraine Warns Of Growing Russian Use Of AI In Cyberwar Operations

Ukrainian cyber experts say Russia is using AI tools to analyse data stolen in cyber attacks, making its operations more precise & effective.

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

2025-01-06

Israel Establishes A Unified Military AI Command

Artificial Intelligence has emerged as one of the most transformative digital technologies, and Israel is driving its use in military applications.

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.