GOVERNMENT > Defence


« Back to News

2020-12-07

Russian Hackers Lured With Honeypots

NATO is using deception against hackers, who, believing their intrusions to be successful, are actually exposed to surveillance and analysis.

2020-11-27

Cyber Security Has Become Critical For National Security

Critical national infrastructure, both public and private, is increasingly interconnected and has become susceptible to predatory cyberattacks.

2020-11-09

Cyber Warfare Is The New Frontier

The Future Of Conflict: In an accelerating cyber arms race, there is a lack of clear international rules governing the use of cyber weapons.

2020-11-05

US Cyber Command Were Running An 'Election Special'

Hunt Forward: A special operation against malicious foreign cyber actors to seek out hackers from Russia, China well before the US election.

2020-11-05

British Military Gets A Defensive Cyber Security Platform

Researchers have shared expertise to enable the cyber security platform to make predictions about the likely next steps of an evolving attack.

2020-11-03

US Invests Big In Space Force Cyber Security

US Space Command will dramatically increase the size of its cybersecurity team and are planning to add an additional thousand new personnel.

2020-11-03

Securing AI In Military Systems

Military robots will in the future incorporate AI that could make them capable of undertaking missions on their own. They must be immune to hackers.

2020-10-19

The Emerging Domain Of Cyber War

Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-08

The US Steps Up Its Cyberwar Capability

Cyberspace is a warfighting domain and the US military is waking up to the need to defend the country and its allies from foreign cyber threats.

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.