DARPA Has Invented The Ultimate Cyber Security

US Defense Advanced Project Research Agency DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS.

When the Internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half a decade ago, and obviously this breakthrough technology has come a long way. In just a few decades, the Internet has become the central and by far the largest source of information we have.

The amount of data on the Internet, be it science researches, personal profiles on social media or cat videos, makes it more and more difficult with each passing day to keep our personal information, to say nothing of commercial and state secrets, safe from prying eyes.

In answer to rising concerns over data breaches and cyber-terrorism, DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS. The details are complicated and full of tech jargon, but basically what DARPA is trying to create is an unhackable code. And for the time being, at least, they seem to be successful.

DARPA brought in a team of hackers to try and break into it. The HACMS team stored the code on a real-life, unmanned attack helicopter to see if their team could retrieve it. Even after the hackers were handed access to the actual source code of the helicopter, they were unable to penetrate the main systems and retrieve the code.

The implications are great. Cyber attacks are probably one of the top fears of most organizations, institutions and individuals in the connected world. DARPA might not be there quite yet, but the results are encouraging.

Cyber security has perhaps never been this important, and not just for individuals, who fear someone might hack their e-mails and steal their personal information. The battle raging in past months between governments and enterprises regarding encryption in personal devices and the right itself for encryption calls for progress in this field. In the US, which currently displays this in the clearest way, a battle is raging between companies like Apple, Google and Microsoft and the would-be surveillance state envisioned by some statesmen serving in Washington, DC.

I-HLS:

« Hackers-For-Hire Services Booming
Do The #PanamaPapers Make All Law Firms A Target? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.