GOVERNMENT > Defence


« Back to News

2022-04-18

The Ukraine War - By Satellite, Internet & Phone

Technology can serve a vital purpose in this conflict, facilitating the exposure of Russian propaganda & accelerating efforts to defeat their forces. 

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-12

Finland Hit By Cyber Attacks

The Finnish Foreign and Defence ministries' websites were knocked offline & the Ministry of Defence tweeted that its website was under attack.

2022-04-06

The Pentagon Gets $250m Extra To Spend On AI

The Pentagon’s AI and Data Acceleration Initiative is intended to speed up the adoption of ArtificiaI Intelligence across US Combat Commands.

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-14

The US Military Want 5G Fast

Military communications need the rapid transfer of large quantities of data that 5G technology enables, combined with high levels of resilience.

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-03-02

The Online Battle In Ukraine

Ukraine's invasion is Europe's first experience of conflict in the digital age. Social media, the Internet & Telecoms networks have been weaponised.

2022-02-25

New Tools To Simulate Electronic Warfare

Swarming Munition: The US Air Force is testing autonomous software to simulate electronic warfare in complex, multiple target settings.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.