GOVERNMENT > Defence


« Back to News

2017-02-27

Could Britain Fight A Cyber War with Russia?

Can the UK and its NATO allies compete on the cyber battlefield as much as they do in the conventional spheres of air, land & sea warfare?

2017-03-03

‘Cyber War’ Is Fast Becoming Just ‘War’

The next great conflict will play out not just on physical terrain but also in the electrical pulses of cyberspace and the electronic spectrum.

2017-02-13

Hologram Technology Is Finding Military Users

Microsoft’s HoloLens hologram headset systems are already being used in the Australian, Ukrainian and Israeli armies.

2017-02-22

Cyberwarfare: Borders Offer No Defense

A lack of recognisable boundaries or any rulebook in cyber conflict has equalised the balance of forces and increased the threat level.

2017-02-08

Data Fusion For Military Intelligence & Business

Advances made by business to solve Big Data problems mean that Intelligence analysts have access to more information than ever before.

2017-02-08

Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a wide range of digital tools to recruit members and plan attacks. Some experts say they are winning.

2017-02-16

The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

2017-02-13

Is The World On The Verge Of A Cyber War?

Some experts say a combination of geopolitical and strategic circumstances is leading to an inevitable State vs. State conflict in cyberspace.

2017-02-06

DARPA Working On Secure Data Sharing

DARPA is kicking off a project to create a new way to enable US troopsto securely send and receive sensitive information on their devices.

2017-01-30

Hacker, Tailor, Soldier, Spy: Future Cyberwar

Lights Out: Someone wants the power down. Someone is sowing chaos and waiting to take advantage. This is how a cyber war begins.

2017-01-25

Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is working on new ways to enable US troops working in remote areas to securely send and receive sensitive information on their devices.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.