GOVERNMENT > Defence


« Back to News

2015-02-19

Memex – The new search tool and for the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex, which will improve also researches into the "Deep Web".

2015-02-19

Cyber Warfare: Technology backfires on the powerful.

Cyber warfare is fast becoming the most progressive military technology since the Second World War. This rapid progression raises the question of identifying which global actors benefit most from a new found cyber capability.

2015-02-18

US Cyber Intelligence Agency – Will it work?

The Obama administration is about to create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

2015-02-05

Did the White House Use Drone Killing Technology?

At about 3 a.m. on Monday 26th January, a small quadcopter drone, or unmanned aerial vehicle, crashed on the White House lawn. White House officials said that the drone, by itself, was unarmed and didn't represent a threat

2015-02-05

US Military Is Building Advanced Military Drones

For the Pentagon, drones are cheaper to buy and to operate than regular fighter jets. An armed MQ-9 Reaper drone runs about $14 million, compared to $180 million or more for an F-35 Joint Strike Fighter. But unlike barrel-rolling a jet, the business of actually operating a unmanned aerial vehicle, UAV, for the military is lonely, thankless, and incredibly difficult.

2015-01-29

NSA Director on Sony Hack: ‘The Entire World is Watching’

National Security Agency Director Admiral Michael Rogers expressed support Thursday for the United States’ economic sanctions against North Korea in response to the hack on Sony Pictures Entertainment, and called the attack against the movie studio a “game changer” for cybersecurity.

2015-01-27

Critical Infrasctructure: UK and US Power Grids - Under Cyber Attack Every Minute

The UK government is one step ahead of hackers trying to turn off the country’s lights, for now. The prospect of cyber-attacks on the nation’s power network is a major threat to the country’s security, according to James Arbuthnot, a member of parliament who chaired the Defense Select Committee until last year. He plans to visit National Grid Plc. (NG/) next month to discuss the issue.

2015-01-19

Dark Web thrives despite Operation Onymous

There is a part of the web that is still hidden from the majority of the Internet users, a so-called dark web that cannot be found by conventional search engines or accessed by standard browsers.

2015-01-08

FBI briefed on alternate Sony hack theory

FBI agents who are investigating the Sony Pictures hack were briefed recently by a security firm that says its research on the attacks points to laid-off Sony staff and not to North Korea, as the perpetrator.

2015-01-12

MI5 seeks new powers after Paris magazine attack

Andrew Parker describes Charlie Hebdo outrage as ‘a terrible reminder of the intentions of those who wish us harm’

2014-03-11

Who Wants To Run The NSA Now?

Whilst renegade NSA employee Edward Snowden was warmly applauded at his virtual appearance by covert video-link from an unknown location to an audience at the Texas SXSW media & technology conference, the designated new NSA Director, Admiral Michael Rogers, strapped in for a bumpy ride at US Senate confirmation hearings.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.