GOVERNMENT > Defence


« Back to News

2016-03-15

China’s Quantum Satellite Changes Cryptography

China is fast becoming a world leader in quantum communications technology.

2016-03-14

China Cracks Down On Top Hong Kong Newspaper

Firewall Censorship: Social media accounts of the South China Morning Post suspended and the media group's news websites blocked in China.

2016-03-19

Underwater Drone Technology Could Doom Trident

New technologies, both unmanned underwater vehicles (UUV) and advanced sensors, could make the world’s oceans “transparent” to submarines.

2016-03-08

One Ethicist’s Compromise To Stop Killer Robots

If the United Nations won’t stop killer robots the United States could make a start by setting some rules limiting their development and use.

2016-03-11

Japan's Critical Infrastructure Under Cyberattack

Waves of cyber attacks against key industries across Japan, S. Korea, the United States, Europe and other Southeast Asian countries. But where from?

2016-03-09

Open Source Intelligence: Special Ops In Syria Exposed

An unparalleled level of transparency accessible at the click of a mouse is exposing the deployment of military assets.

2016-03-08

US Military Are Doubling Down On Robot Wars

The US military are investing heavily in a new generation of unmanned, autonomous weapons.

2016-03-04

Pentagon Starts Aggressive Cyberwar Against ISIS

The US military is ramping up its offensive cyberattacks on the Islamic militant group, targeting the group’s abilities to use social media.

2016-03-02

Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

The Chinese military cyber force includes one cadre of dedicated military specialists devoted to network warfare, cyberattacks and defense.

2016-03-02

Ex CIA Director: Keep America Safe, Embrace Drone Warfare

Targeted killing using drones has become part of the American way of war. Doing it legally is the tricky bit, says Michael Hayden.

2016-03-01

Forget Trident & Welcome To Cyber Warfare

Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.