GOVERNMENT > Defence


« Back to News

2016-01-21

Can the Warfare Concept Of Manoeuver Be Usefully Applied In Cyber Operations?

Although the cyber domain has unique characteristics, the timeless principles of manoeuver warfare still apply. Opinion by David Gioe

2016-01-15

US Critical Infrastructure Is Vulnerable To Electromagnetic War

An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital & non-vital services.

2016-01-15

NSA Chief Says The Rules of War Do Apply to Cyberwar

The Pentagon keeps its rapidly expanding cyber arsenal almost entirely secret.Is there a way to publicly discuss the future of cyber operations?

2016-01-14

Islamic State Launches A Cyber War Magazine

Islamic State has launched a magazine, 'Kybernetiq' to guide jihadists on how to take part in 'cyber war' including encryption & messaging.

2016-01-14

Britain's Nuclear Subs In Cyber War

Britain's new submarine fleet will be equipped with the latest deadly nuclear missiles. Could they be rendered impotent by cyber warfare?

2016-01-04

China Passes Controversial Counter-terrorism Law

China passes anti-terrorism laws that requires technology firms to help decrypt information and permits the military to pursue terrorists overseas.

2016-01-06

ISIS Secret Cyber Terrorism Forum Exposed

Discovered using the Telegram messaging app the hidden forum reflects ISIS hackers' growing desire to wage war online.

2016-01-04

Cyberwar: Islamic State, Russia & China Hold The Advantage

Can democracies compete 'where powers can be fighting each other with one hand and shaking hands with the other?'

2015-12-23

Could IS Create A Cyber War?

Critical industries need to significantly ramp up their cyber security or risk having Islamic State hackers attack.

2015-12-15

Cyber Warfare: An Integral Part of Modern Politics

Cyber-operations are being used for a wide range of information warfare & intelligence gathering purposes, according to NATO.

2015-12-14

French Government Proposals To Block Tor and Forbid Free Wi-Fi

Le Monde reports two proposals for legislation, one around the state of emergency, and the other related to counterterrorism measures.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.