GOVERNMENT > Defence


« Back to News

2018-12-19

US Senator Calls For New Cyber Doctrine

Sen. Mark Warner calls for a new US cyber doctrine designed to combat modern threats from hackers and disinformation campaigns.

2018-12-18

Cyber Weapons Are Proliferating Beyond Control

Cybersecurity is quickly moving beyond the pure financial impact to concerns over public safety, national security and even cyberwarfare.

2018-12-12

Germany Develops Offensive Cyber Capabilities Without A Coherent Strategy

Berlin’s latest move favoring offensive cyber activity is the creation of a cyber innovation agency, akin to the United States’ DARPA.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

2018-12-06

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

The crisis triggered by the maritime clash in the Black Sea has brought widespread denunciations of Russian aggression. What happens next?

2018-12-05

Britain's Top Soldier Warns Of Russian Threats

The head of the British army says Russia is now a "far greater threat" to the UK's national security than the Islamic State terror group.

2018-11-27

Russian Cyber Strategy And Tactics

Russia views cyber very differently to its western counterparts, from how they define cyberwarfare to how they employ cyber capabilities.

2018-11-27

UK Fails To Act Against Cyber Threats

Government Ministers in the UK are failing to act with “a meaningful sense of purpose or urgency” in the face of the growing cyber threat.

2018-11-26

GRU: Spies Without Borders

How were two undercover GRU officers able to obtain visas to travel to the UK to poison and attempt to kill Sergey and Yulia Skripal ?

2018-11-21

Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks

Iran’s chief of civil defense recently claimed that the Iranian government had fought off what he described as a new version of Stuxnet.

2018-11-23

Cyber Warfare Needs Rules Of Engagement

Cyber space is the new battle space and eminent intelligence leaders are now calling for international terms of engagement in cyberwar.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.