GOVERNMENT > Defence


« Back to News

2025-03-30

Britain's Armed Forces Fast-Track New Digital Recruits

As risk levels rise, fast-tracked recruits are entering a rapidly evolving sector, while the IT landscape becomes more challenging. By Richard Giblin

2025-03-18

Geopolitics, Nation-State Hackers & Cyberwar

As geopolitical tensions are rising, state-sponsored hackers are intensifying their efforts, targeting defence & government institutions.

2025-02-24

Iran Deploys AI - Guided Missiles & Drones

The use of AI in missile technology has the potential to shift military power balances in the M. East, as Iran advances its missile development.

2025-02-18

Ukraine Warns Of Growing Russian Use Of AI In Cyberwar Operations

Ukrainian cyber experts say Russia is using AI tools to analyse data stolen in cyber attacks, making its operations more precise & effective.

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

2025-01-06

Israel Establishes A Unified Military AI Command

Artificial Intelligence has emerged as one of the most transformative digital technologies, and Israel is driving its use in military applications.

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

2024-11-26

British Government Minister Predicts Russia Will Step Up Cyber Attacks 

Shut Down The Power Grid: Russia is ready to carry out cyber attacks on the UK and its NATO allies in a bid to weaken support for Ukraine.

2024-10-29

AI-Driven Air Defense System Takes Aim At Drones

Drone Swarms: Defenders can neutralize drone threats simply by tapping a mobile device, simplifying decision-making & improving flexibility.

2024-10-21

Nowhere To Run

Killing As A Video Game: Lethal automated drones are moving from human directed targeting to pre-programmed targeting. By Ron Marks

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.