GOVERNMENT > Defence


« Back to News

2019-06-26

US Cyber Attack On Iran

Unleash The Hackers: US missile forces stand down as President Trump orders Cyber Command to take the lead role in attacking targets in Iran.

2019-06-26

The Human Cost Of Cyberwar

The Red Cross fear that the proliferation of cyber attacks on critical infrastructure will lead to mass casualties and want a detailed expert inquiry.

2019-06-19

Britain Hacks Back

The British government is stepping up the rhetoric on cyber warfare, with £22m to be spent on an "offensive hacking" unit.

2019-06-10

The ‘Rules’ Of Modern Warfare Are Being Rewritten

Politically-motivated cyber-attacks are commonplace but cyberwarfare can be launched by groups of individuals, not just nation-states.

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-06-06

Cyber Command Knows Its Tools Can Also Be Used By Their Targets

US Cyber Command leaders understand that the cyber weapons that they have made to attack their enemies might also be turned against them.

2019-06-04

US Army Identifies How To Improve Cybersecurity

US Army researchers have developed a tool that limits damage caused by malicious traffic, cutting it off after a given number of messages are sent.

2019-05-29

The US Can't Stop China Copying Its Cyber Weapons

China is copying the malware that the NSA developed to use against them. Is this preventable or is it an inherent weakness of cyber warfare?

2019-06-03

The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility takes an holistic view of the global cyber environment to help make more informed military decisions.

2019-05-30

Cyber Threats And Nuclear Weapons Systems

Nuclear supply chains and nuclear command and control systems are at risk of being compromised and these risks must be urgently addressed.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.