GOVERNMENT > Defence


« Back to News

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-19

What Is The Stuxnet Worm?

Stuxnet is a computer worm that targets industrial control systems to inflict damage, but is most famous for being the first genuine cyber-weapon.

2017-09-18

Which Countries Are Ready For Cyberwar?

Including the usual suspects, over 30 countries are developing offensive cyber-attack capabilities, although their programmes are shrouded in secrecy.

2017-09-15

Cyberwar: A Guide

At its core, cyber warfare is the use of digital attacks by one country to disrupt the computer systems of another to create significant destruction.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

2017-09-07

‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

As regional tensions deepen, Japan’s Communications Ministry is creating decoy computer systems to combat cyber-attacks,

2017-09-08

US Navy’s State-of-The-Art AI Drone

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly.

2017-09-06

A Revolution In Warfare Made Possible By AI

AI is revolutionising warfare in ways similar to the invention of nuclear arms and in the same way could ultimately destroy humanity.

2017-09-06

'Killer Robot' Warfare Is Coming Closer.

Top robotics experts write a letter to the UN calling for a ban on the development of "killer robots" and warning of a new arms race.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

MixMode

MixMode

MixMode's PacketSled platform delivers network monitoring, deep forensic analysis and incident response.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.