GOVERNMENT > Defence


« Back to News

2015-12-09

Cybersecurity Is A Big Government Problem

Constant vigilance is required to protect US government systems. Unfortunately, these same systems might not be up to the task.

2015-12-04

N. Korea Employs Grads for Cyber Warfare

North Korea is reportedly recruiting graduates from Pyongyang University of Science & Technology for cyber warfare.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-11-27

Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack

Britain’s Trident nuclear weapons system may turn out to be obsolete or unusable because of vulnerability to 'full spectrum' cyber assault.

2015-12-04

CIA Say Edward Snowden 'taught ISIS to avoid detection'

Former CIA deputy director claims Snowden is directly implicated in the rapid expansion of ISIS in the months after his first leaks in 2013.

2015-11-25

Did China Authorize Major High Level Hack on US & It’s Allies?

High Alert: Google announces discovery of a phishing scam based in China, targeting email passwords of senior government officials.

2015-11-25

De-escalation Is The Answer To Growing Cyber Tension

Failure to follow through on the US-China cyber non-agression agreement could be the first step in history toward an inevitable world cyberwar.

2015-11-24

ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

Islamic State has reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

2015-11-23

Restricting Encryption Wouldn’t Stop Paris-Style Attacks

It’s not clear that undermining strong encryption would do anything to prevent terrorism.

2015-11-23

Britain Building Cyber Forces to Attack ISIS

Britain will bolster spending on cyber defences, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.