GOVERNMENT > Defence


« Back to News

2018-06-13

F-35 Is The Most Thoroughly Tested Cyber Weapon

Debugging: With almost 9m lines of software code the new warplane has been described as essentially a flying computer.

2018-06-12

Russia Is Building A Separate Military Cloud

Russia is building a giant military cloud, to improve its ability to keep operating if its connection to the global Internet is hacked or severed.

2018-06-11

Pentagon Faces Big Challenges In Retaining Cyber Talent

The U.S. Department of Defense faces tremendous challenges in recruiting and retaining trained & experienced cybersecurity professionals.

2018-06-08

US Needs To Cultivate Its Cyber Workforce

US efforts to grow its cybersecurity workforce need "immediate and sustained improvements," according to the US Dept. of Homeland Security.

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-24

Is the Pentagon Cloud Secure Enough to Hold Nuclear Secrets?

The US Government will shortly award a huge contract to host its most intimate defense secrets, thought to include its nuclear weapons codes.

2018-05-14

Iran Likely To Retaliate With Cyberattacks

The experts at Recorded Future say Iran could swiftly deliver cyberattacks against Western business following US withdrawal from a nuclear treaty.

2018-05-10

Australia Points The Finger At Russia For Cyberattacks

Australian intelligence agencies have identified Russia as the actor behind a series of cyberattacks affecting 400 businesses sine 2017.

2018-05-02

AI Increases The Risks of Nuclear War

Artificial Intelligence could destabilise the delicate balance of nuclear deterrence, inching the world closer to catastrophe, according to RAND.

2018-05-08

Killer Robots Are A Revolution in Warfare

Fully autonomous weapons do not yet exist, but senior military thinkers say the use of robots will be widespread in warfare in a matter of years.

2018-04-20

Google Chairman Unaware Of Pentagon AI Project

Google is bidding for a multi-billion dollar Pentagon cloud contract. Which comes as news to the company Chairman, Eric Schmidt.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.