GOVERNMENT > Defence


« Back to News

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-06-06

Cyber Command Knows Its Tools Can Also Be Used By Their Targets

US Cyber Command leaders understand that the cyber weapons that they have made to attack their enemies might also be turned against them.

2019-06-04

US Army Identifies How To Improve Cybersecurity

US Army researchers have developed a tool that limits damage caused by malicious traffic, cutting it off after a given number of messages are sent.

2019-05-29

The US Can't Stop China Copying Its Cyber Weapons

China is copying the malware that the NSA developed to use against them. Is this preventable or is it an inherent weakness of cyber warfare?

2019-06-03

The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility takes an holistic view of the global cyber environment to help make more informed military decisions.

2019-05-30

Cyber Threats And Nuclear Weapons Systems

Nuclear supply chains and nuclear command and control systems are at risk of being compromised and these risks must be urgently addressed.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-15

High-Tech Enhanced Military Vision

The Enhanced Human: French researchers have created a lightweight contact lens offering augmented vision with a wireless visual relay.

2019-05-13

Has President Trump Lost The Cyber Plot?

The US Navy could be at risk of investing in conventional 'kinetic' force where it already predominates, at the expense of cyber weapons.

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-08

AI And The Future Of Warfare

The Pentagon's strategic thinkers would like AI to help human analysis, not replace it. But how will humans interact with AI and robots?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.

Rocket Software

Rocket Software

Rocket Software helps customers in all industries solve their most complex IT challenges, across infrastructure, data, and applications — with solutions that simplify, not disrupt.