GOVERNMENT > Defence


« Back to News

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

2025-01-06

Israel Establishes A Unified Military AI Command

Artificial Intelligence has emerged as one of the most transformative digital technologies, and Israel is driving its use in military applications.

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

2024-11-26

British Government Minister Predicts Russia Will Step Up Cyber Attacks 

Shut Down The Power Grid: Russia is ready to carry out cyber attacks on the UK and its NATO allies in a bid to weaken support for Ukraine.

2024-10-29

AI-Driven Air Defense System Takes Aim At Drones

Drone Swarms: Defenders can neutralize drone threats simply by tapping a mobile device, simplifying decision-making & improving flexibility.

2024-10-21

Nowhere To Run

Killing As A Video Game: Lethal automated drones are moving from human directed targeting to pre-programmed targeting. By Ron Marks

2024-09-27

Will Hezbollah Launch Cyber Attacks On Israel?

Neither is immune to cyber attacks or operations like the explosive pager attack. Both are racing to prevent attacks while targeting each other.

2024-09-24

Remote Pager Attack Begins A New Era Of Warfare

Lethal explosive devices precisely targeted members of Hezbollah, an anti-Israel military organization, controlled by the government of Iran.

2024-09-24

British Security Agency Accuses Russian Military Of Cyber Sabotage 

Unit 29155: The Russian military has been undertaking computer network operations for the purposes of espionage, sabotage & reputational harm.

2024-09-30

Space: The Last Cybersecurity Frontier?

Space is a growing part of national critical infrastructures, with commercial spacecraft & military communications at risk of being badly compromised.

2024-09-02

Iranian State-Sponsored Hackers Attacking Israel

Established Iranian hackers are working with cyber criminals who specialise in ransom, sharing their expertise to accelerate attacks on Israel.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.