GOVERNMENT > Defence


« Back to News

2016-05-04

US Cyber Bombs On ISIS Change The Nature Cyber War

US Cyber Command is going on the offensive with aggressive online operations to augment lethal conventional military force with cyber capabilities.

2016-05-04

Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Africa and counter-efforts are struggling.

2016-05-03

US Army's $12bn Mobile Internet Is Vulnerable

Improvements are needed to user training techniques, procedures, hardware and software enhancement to harden against cyber-threats.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-27

MoD Email Blunder Leaks Secret NATO Report

The British Ministry of Defence (MoD) made an 'administrative error' leading to the accidental leak of a secret NATO document.

2016-04-19

CYBERCOM Elevated To Full Combatant Command Status

Cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

2016-04-21

‘Eye In The Sky’: The Reality Of Drone Warfare Revealed

‘Eye in the Sky’ is a thrillingly intelligent exploration of the political and ethical questions surrounding drone warfare.

2016-04-19

The First Ghost Ship In The US Robotic Navy

Autonomous vessels like this submarine hunter will play a growing role in future naval missions and will soon crowd the seas.

2016-04-21

DARPA Has Invented The Ultimate Cyber Security

US Defense research organisation DARPA has spun off a new project called High-Assurance Cyber Military Systems.

2016-04-17

US Cyberwar Against ISIS Begins

US Defence Secretary, Ashton Carter has issued orders to the US Cyber Command to launch online attacks against the terrorist group.

2016-04-12

Chinese Military Aim To Lead On Cyber-Space Defense

The Chinese military is forming a new Strategic Force to enhance its cyber warfare, space security & online espionage capabilities.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.