GOVERNMENT > Defence


« Back to News

2018-02-09

Killer Robots Will Be Ubiquitous In The US Army

In future, every US combat vehicle is going to have the capability to be robotic and to deliver 'solid lethality'.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-23

Army Chief Urges UK To Increase Cyber Defence & Attack Capabilities

The UK’s ability to respond to threats will be eroded if the country does not keep up with its adversaries in terms of defence spending.

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-11

A Cyberattack Could Lead To A Nuclear Strike

There are vulnerabilities to nuclear weapons systems exploitable through the use of malware & viruses, which could leave them open to harmful attack.

2018-01-10

Pentagon Seeks Laser-Powered Bat Drones

Flying robots that move like living animals, crafted of next-generation materials that draw their power from energy beamed from nearby aircraft.

2018-01-10

GCHQ Doubles Down On Cyber Weapons

As the threat of escalating cyber warfare looms, GCHQ has revealed the extent to which it has armed the UK with offensive cyber capabilities.

2018-01-10

Retaliation Against N Korea For WannaCry

The US and British governments appear to be preparing a cyber offensive against N. Korea in payback for the damaging Wannacry attack.

2018-01-09

US Cyber Soldiers Go To The Battlefield

The US Army is beginning to combat opponents by 'non-kinetic means' and going on the offense against enemy computer systems.

2018-01-08

Russia's Experimental Hybrid War With Ukraine

Against attacks which use the latest methods developed by Russia's top military theorists, Ukraine is a canary in the cyberspace coal mine.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.