GOVERNMENT > Defence


« Back to News

2017-09-27

Cybersecurity Investigations After US Naval Collision

Probing for potential cyber intrusions will become a standard procedure following unexplained collision damage to a US guided missile destroyer.

2017-09-28

Global Cyber Conflict Is Close

It is probable, not just possible, that cyberattacks will soon shut down power grids, paralyse financial data systems & sabotage military equipment.

2017-09-26

Why Cyber Attacks Could Be War Crimes

If international conflicts are unavoidable, is cyberwar better than a war with bombs and bullets? If so, then could a cyberattack be a war crime?

2017-09-25

AI Could Lead To World War

Tesla’s Elon Musk and Alphabet’s Mustafa Suleyman are calling for the ban on autonomous weapons.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-19

What Is The Stuxnet Worm?

Stuxnet is a computer worm that targets industrial control systems to inflict damage, but is most famous for being the first genuine cyber-weapon.

2017-09-18

Which Countries Are Ready For Cyberwar?

Including the usual suspects, over 30 countries are developing offensive cyber-attack capabilities, although their programmes are shrouded in secrecy.

2017-09-15

Cyberwar: A Guide

At its core, cyber warfare is the use of digital attacks by one country to disrupt the computer systems of another to create significant destruction.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Portuguese Institute for Accreditation (IPAC)

Portuguese Institute for Accreditation (IPAC)

IPAC is the national accreditation body for Portugal. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.

Obviam

Obviam

Obviam specialize in providing security solutions tailored to meet the unique needs of each of our clients, no matter where they are in their security journey.