GOVERNMENT > Defence


« Back to News

2018-01-08

Russia's Experimental Hybrid War With Ukraine

Against attacks which use the latest methods developed by Russia's top military theorists, Ukraine is a canary in the cyberspace coal mine.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

2017-12-19

The Current Threat Of Global Cyber Warfare

Government and corporate cyber resources are under attack around the globe. Cyber warfare is a real threat and it is happening now.

2017-12-18

Undersea Telecoms Cables Are Interception Targets

Undersea cables carrying vital data are essential to modern communications but lack both physical and legal protections. That's a problem.

2017-12-08

Fake News & Botnets: Russia Has Weaponised The Web

The core concept of cyberwar is psychological manipulation, executed with targeted digital disinformation to weaken a country from within.

2017-12-01

Paying For The UK’s Cyber War With Russia

The UK Government is torn over whether to cut funding for conventional forces to spend more of the Defence budget on cybersecurity measures.

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

2017-11-28

Russia Is Building Killer Robots

Russia has successfully undermined the UN Experts Group attempts to place limits on the development of lethal autonomous 'Killer Robot' weapons.

2017-11-23

First EU Cyber Defence Exercise

In a simulation, EU Defence Ministers faced sabotage to a naval mission and a social media campaign to discredit them. How did that go?

2017-11-21

N. Korean Hackers Plan to Devastate UK

Hacking groups linked to North Korea will continue to devastate the UK with major cyberattacks says former GCHQ Director Robert Hannigan.

2017-11-16

The Current State of Cyber Warfare

The defence apparatus has an indispensable role in national cybersecurity but it should be under close democratic control. By Lior Tabansky.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.