GOVERNMENT > Defence


« Back to News

2017-01-03

Cyber Deterrence: How To Curb Cyber Attacks

Deterrence focused on making potential adversaries think twice about an attack has worked for nuclear weapons. What about cyber weapons?

2016-12-14

Surprise: N Korea Hacked S Korea Cyber Command

N Korea appears to have hacked S Korea's cyber command in what could be the latest cyberattack against Seoul.

2016-12-02

Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

2016-12-02

War In The Information Age

In the information age of warfare, advantage will be achieved through the speed and integration of actionable data.

2016-11-30

US Navy Personnel Data Breached

The US Navy is investigating a data breach after personal information of more than 130,000 sailors was accessed.

2016-11-25

US Army Command Learning Cyberwar From Social Media

Young, social media-using soldiers may be the linchpin in the US Army's efforts to use cyberwar networks & virtual effects against enemies.

2016-11-24

Some Observations On Britain's New Cyber Security Strategy

A new strategy document spells out an assertive posture by a UK government that seems wary of sharing intelligence capabilities between allies.

2016-11-16

Could You Be A UK Cyber-Warrior?

A crack team of 50 'brilliant brains' is to be recruited by the UK Government to defend the country against hacking attacks.

2016-11-21

Overconfident: US Will Win A Cyber War With China

The Rand Corporation think that the US will soon have a clear advantage over China in cyber war scenarios set in the S.China sea.

2016-11-15

UK Will Retaliate Against Cyberattacks

Preparing To Retaliate: Hostile "foreign actors" are developing techniques that threaten the UK's electrical grid and airports.

2016-11-11

The US Cyber Threat Against Russia

Off The Record: The US has penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.