GOVERNMENT > Defence


« Back to News

2019-11-13

Artificial Intelligence & The Ethics Of War

Responsible, Equitable, Traceable, Reliable, Governable: The Pentagon has produced its first Ethical Code to govern the military use of AI.

2019-11-08

Machines With The Power To Kill

People have quit Google protesting the company's co-operation with the Pentagon on autonomous weapons, which they claim are dangerous.

2019-10-09

Britain Is At Cyber War Every Day

Britain's top military commander thinks that the distinction between peace and war is eroding as the conflict between nations moves online.

2019-10-04

New US Cyber Attacks On Iran

Locked & Loaded: A repeat of a recent covert cyber-attack on Iran by US Cyber Command is growing more likely.

2019-09-23

Will Robots Be Allowed To Kill?

The advent of autonomous weapons demands some form of agreed international legal restrictions on their use. By Alfred Rolington

2019-09-18

AI - Driven Warfare Using Robots

Faster, more high-tech and less human than ever before. A new wave of artificially intelligent weapons are making their way to the battlefield.

2019-09-05

NATO Will Retaliate

Cyberspace is the new battleground and making NATO cyber ready, well-resourced, well-trained, and well-equipped to fight back, is a top priority.

2019-09-02

Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Cyber threats could be just as dangerous as a nuclear conflict, yet this is little understood by some governments and the public at large.

2019-08-30

US Cyber Attack Disabled Iran’s Ability To Target Shipping

A strike by US CyberCommand has disabled a critical Iranian intelligence database, diminishing their ability to conduct covert attacks.

2019-08-28

US Army To Focus On Information Warfare

US Army commanders will all have a dedicated team of cybersecurity professionals to handle electronic and information warfare.

2018-10-05

Russian Agents Are Behind Many Recent Attacks

The British NCSC says that the Russian GRU intelligence agency has long been carrying out widespread 'false flag' cyber attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.