GOVERNMENT > Defence


« Back to News

2017-05-16

Global C4ISR Has A Cyber Warfare Surge

C4ISR refers to Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. It's a growing market.

2017-05-15

National Security Chief Talks About The UK’s Cyber Dangers

The UK National Cyber Security Centre's Chief Executive Ciaran Martin talks about the Cyber threat to the UK and what is being done about it.

2017-05-11

NATO Cyber War Games 2017: Czechs Win

The Czech team won Locked Shields, NATO's international live-fire cyber defence exercise.The US Team were only midfield.

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-03

Cardiff Cyber Security Research Centre - 'first in Europe'

A new UK research centre to tackle cyber-attacks, protect corporate IT networks. IP and critical infrastructure has opened in Cardiff.

2017-05-09

Big Data Tech Alters Homeland Security

The market for Big Data & Data Analytics products for use in Homeland Security is growing fast and will be worth $11 Billion by 2022.

2017-05-03

Cyber Warfare - Alleged Failures Of North Korean Missile Launches

Is it possible that some malware could sit in a North Korean missile system that only becomes active when it is launched in the direction of Japan?

2017-05-05

US vs. North Korea Cyberwar Underway

It seems highly likely that an innovative and highly secretive cyber war is underway with implications for critical infrastructure.

2017-04-26

Drones, Satellites And Cyber Warfare

Israel is the new prototype of a 21st century superpower, not in size, but rather in innovation and efficiency to adapt to the changes in warfare.

2017-04-26

North Korea More Likely To Launch A Cyber Attack Than A Military Strike

US Homeland Security are more concerned about a stealthy cyber attack on critical infrastructure than missiles from the Korean peninsular.

2017-04-24

A Geneva Convention For Cyber War

Unlike conventional conflict, there are no rules of play for cyber attacks. Is it time countries started talking about this nascent form of warfare?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Ministry of Electronics & Information Technology (MeitY) - India

Ministry of Electronics & Information Technology (MeitY) - India

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Freeze

Freeze

Freeze prevents attacks before they can start by finding, removing, and stopping the spread of information about your organization and employees.