GOVERNMENT > Defence


« Back to News

2016-05-03

US Army's $12bn Mobile Internet Is Vulnerable

Improvements are needed to user training techniques, procedures, hardware and software enhancement to harden against cyber-threats.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-27

MoD Email Blunder Leaks Secret NATO Report

The British Ministry of Defence (MoD) made an 'administrative error' leading to the accidental leak of a secret NATO document.

2016-04-19

CYBERCOM Elevated To Full Combatant Command Status

Cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

2016-04-21

‘Eye In The Sky’: The Reality Of Drone Warfare Revealed

‘Eye in the Sky’ is a thrillingly intelligent exploration of the political and ethical questions surrounding drone warfare.

2016-04-19

The First Ghost Ship In The US Robotic Navy

Autonomous vessels like this submarine hunter will play a growing role in future naval missions and will soon crowd the seas.

2016-04-21

DARPA Has Invented The Ultimate Cyber Security

US Defense research organisation DARPA has spun off a new project called High-Assurance Cyber Military Systems.

2016-04-17

US Cyberwar Against ISIS Begins

US Defence Secretary, Ashton Carter has issued orders to the US Cyber Command to launch online attacks against the terrorist group.

2016-04-12

Chinese Military Aim To Lead On Cyber-Space Defense

The Chinese military is forming a new Strategic Force to enhance its cyber warfare, space security & online espionage capabilities.

2016-04-12

Ukraine - More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are predicted to come.

2016-04-12

Israeli Drone Hacked By Five Eyes Intelligence

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist” operating from Cyprus.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.