GOVERNMENT > Defence


« Back to News

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

2018-11-06

The Pentagon Doesn’t Want To Use Real AI

The US military are planning to use Artificial Intelligence in the narrow sense of using machines to help humans make better decisions.

2018-11-06

What Northrop’s Unified Platform Win Means For Cyber War

Northrop Grumman has been awarded a lead role in developing the next generation of weapons for US Cyber Command. What does that mean?

2018-11-02

The Pentagon Prepares A Cyber-Attack On Russia

The defense establishment has agreed a plan for a major cyber-attack that the US could unleash if Russia interferes with the 2018 midterm election.

2018-11-07

Finland Is Worried About Russian Cyberwar Techniques

Falling in the shadow of its giant neighbour means that Finland is being  inevitably drawn into the world of Russian hybrid warfare.

2018-11-12

British Army Gets a New Robot

The British Army has a new ordnance disposal robot with the ability to climb stairs and negotiate slopes of more than 40 deg. to defuse bombs.

2018-10-31

Russia And US Offer Competing Visions Of Cyber Normality

The United States is trying to get Russia, China, and others 'on the record' on how international law applies online.

2018-10-30

Britain To Spend Up To £1B Extra On Cyber Warfare

Britain has decided to spend big on modernising its defence infrastructure, including building expertise in offensive cyber warfare methods.

2018-10-31

Cyber Attack On Weapon Systems Is Easier Than You’d Think

All US weapons that the DoD tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report.

2018-10-26

Microsoft, Amazon CEOs Vow To Continue Defense Work

Google’s decision not to bid for the Pentagon’s $10 billion JEDI cloud contract draws criticism from CEOs of rival tech companies.

2018-10-25

NATO Cyber Command Fully Operational In 2023

A new NATO military command centre should be fully staffed in 2023 and able to mount its own cyber-attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.