GOVERNMENT > Defence


« Back to News

2019-03-04

The US Military Has A Free Rein For Offensive Hacking

The Trump administration made it easier for the US military to conduct offensive cyber operations. But this new authority should be used carefully.

2019-02-28

Could An AI Arms Race Lead To Accidental War?

Chinese experts worry that a rush to integrate AI into weapons and other military equipment could accidentally lead to war between nations.

2019-02-27

Three Ways the Pentagon Could Improve Cyber Intelligence

The US military needs to expand its cyber intelligence capabilities to meet the Trump administration’s new cybersecurity strategy.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

2019-02-22

The US Pentagon Is Speeding-Up Its Cloud Strategy

The US Defense Department has released its new cloud strategy, laying out the pathway for military adoption of cloud technology.

2019-02-07

Pentagon Cybersecurity is Falling Behind

The US military’s cybersecurity capabilities aren’t advancing fast enough to stay ahead of an “onslaught of multipronged” attacks.

2019-01-28

The Future Of War is Cyber

In future, most wars will be waged via computers, servers and digital weapons. Is the United States really prepared for what is coming?

2019-01-25

Australian Defence Chief Issues Cybercrime Warning

Australia's military chief has warned European officials of the ever-present threat posed by cyber espionage and intellectual property theft.

2019-01-23

The US Pentagon Has Numerous Security Gaps

The US Defense Department’s IT systems have 200+ vulnerabilities that put the Pentagon at risk of hacks and data theft.

2019-01-21

US Vs. China - A Different Kind of Cyberwar

China is engaged in its own form of cyberwarfare, but one that does not readily fit into the West’s long-standing perceptions of war and peace.

2019-01-24

DARPA Wants To Emulate Insect Brains

Insects are small, efficient and capable of basic reasoning. US military researchers at DARPA want artificial intelligence tools that do the same.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.