GOVERNMENT > Defence


« Back to News

2015-06-01

North Korean Hackers 'could kill', Warns Defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and kill people.

2015-06-01

Iran Suffering a Techno Gap in Cyber Defense

The commander of Iran's Passive Defense Organization thinks the country suffers a technological gap in cyber defense.

2015-06-01

US DoD Signals Silicon Valley's Importance in CyberWar

The US security apparatus is growing increasingly dependent on Silicon Valley.

2015-05-26

Pentagon Might Share US Data with Foreign Militaries

Proposed US Cyber Information Sharing Act will permit sharing cyber threat data beyond the United States.

2015-05-26

US Defense Signals Silicon Valley's Cyberwar Help

The US government has a rapidly growing dependence on Silicon Valley,

2015-05-24

Silicon Valley a Major Player in Cyberwarfare

US Department of Defense will provide venture capital funding to startups that can help the Pentagon develop more advanced cybersecurity.

2015-05-22

FBI Director says ISIS Could Cyberattack the US

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US.

2015-05-19

Nine Strange Flying Robots from the 2015 Drone Show

The future of drone design is an area with huge importance for companies and for the military. At the recent Unmanned Systems 2015 Show that future was on display.

2015-05-20

China says Wearable Tech Could Leak Secrets

Wearable tech is now on the growing list of cyberwar battlefields, alongside email inboxes and USB drives.

2015-05-19

Pro-ISIS Hackers Threaten the US & EU

“We are the hackers of the Islamic State. The electronic war has not yet begun,”

2015-05-12

The US Air Force Wants You to Build a Drone Engine

“A successful 100-horsepower turbo shaft engine that operates on Jet A fuel and generate at least 2.0 horsepower per pound.”

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.