GOVERNMENT > Defence


« Back to News

2020-07-07

Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history occurred because an employee took advantage of weak security. And It wasn't Edward Snowden.

2020-07-15

Australia To Spend Another A$1billion On Cyber Security

Australia has announced a massive cyber security investment to combat a wave of 'unattributable' and damaging cyber-attacks. Whos' next?

2020-06-24

Australia Assaulted By Severe State-Backed Cyber Attacks

Australia has not directly accused China and yet the scale, nature of the targeting and the signature methods used all point one direction.

2020-06-16

Britain Is Wide Open To Cyber Spying

Espionage against the UK is both wide reaching and significant and the Centre for Protection of National Infrastructure is one part of the response.

2020-06-15

The British Army Has A New Cyberwar Regiment

The unit will provide ‘digital armour’ to give commanders and their soldiers the ability to operate with secure communications systems.

2020-06-15

Nuclear Missile Contractor Hacked

Hackers have stolen confidential documents from a US firm which provides critical support for the country's Minuteman III nuclear deterrent.

2020-05-27

Iran In The Firing Line

There is a persistent cyber conflict in the M. East and the region is at the forefront of experiments with new online weapons with Iran at the centre.

2020-05-12

Quantum Science Will Revolutionise Security

Quantum computing is predicted to transform scientific research, stock market prediction and cryptography, a key component of cybersecurity.

2020-04-15

Japan's New AI-Based Cyber Defence System

Japan's military plans an AI-powered defence system to respond fast to attacks on infrastructure in an automated way and to neutralise their effects.

2020-03-31

The US Is Facing A Catastrophic Cyber Attack

The US is “dangerously insecure in cyber,” and needs to take a series of actions to avert attacks on critical infrastructure & financial services.

2020-03-24

Fronton: A Secret Russian Tool To Shut Down The Internet

Russia's national spy agency has powerful new tools that can shut down internet services by tapping into IoT connected smart devices.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.

Executive Operations (EXOP)

Executive Operations (EXOP)

Executive Operations provides 24/7 cyber security staffing - SOC support, compliance, IT help desk & app development. Save 60% with skilled English-speaking teams.