GOVERNMENT > Defence


« Back to News

2017-10-12

Russia’s Digital Weapons Refined Against Ukraine

Russia is developing and refining a generation of powerful new cyber weapons by experiment on neighbouring Ukraine.

2017-10-05

N.Korea's Cyber Threats To S.Korea

Alongside the escalating missile threat N Korea is stepping up cyber intrusions with fake communications and hacking attacks.

2017-09-25

Is A Cyberattack An Act of War?

As warfare becomes increasingly digital, countries are facing a major problem: It’s hard to define when a cyber attack constitutes an act of war.

2017-09-28

Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data & artificial intelligence is a major priority for the intelligence community.

2017-09-19

The EU Holds Its First Cyber War Game Exercise

Crisis Management: European Union national defense ministers have been taking part in a simulated cyber-attack exercise for the first time

2017-09-27

Cybersecurity Investigations After US Naval Collision

Probing for potential cyber intrusions will become a standard procedure following unexplained collision damage to a US guided missile destroyer.

2017-09-28

Global Cyber Conflict Is Close

It is probable, not just possible, that cyberattacks will soon shut down power grids, paralyse financial data systems & sabotage military equipment.

2017-09-26

Why Cyber Attacks Could Be War Crimes

If international conflicts are unavoidable, is cyberwar better than a war with bombs and bullets? If so, then could a cyberattack be a war crime?

2017-09-25

AI Could Lead To World War

Tesla’s Elon Musk and Alphabet’s Mustafa Suleyman are calling for the ban on autonomous weapons.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-19

What Is The Stuxnet Worm?

Stuxnet is a computer worm that targets industrial control systems to inflict damage, but is most famous for being the first genuine cyber-weapon.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.