GOVERNMENT > Defence

Please log in to browse. Login now

« Back to News

2016-02-24

The Big Three: N. Korea, ISIS and CyberWar

U.S. Director of National Intelligence James Clapper identifies three major threats to US security in 2016.

2016-02-19

NSA AI Technology May Have Targeted Innocents

The NSA has been using a machine-learning program to identify & target terrorists with deadly force, but its methodology may have been wrong.

2016-02-15

NSA Is Merging Hacker And Anti-Hacker Teams

A reorganisation of the NSA increases pressure on US spies to choose between keeping hackers out – or acting like them to gather intelligence.

2016-02-15

New Microchip Increases Military Intelligence

A new microchip could transform the 21st century battlefield by bringing massive data crunching power to handheld devices.

2016-02-09

Active Cyber Defense Task Force

The US Center for Cyber and Homeland Security has launched a new project about active defense by the private sector against cyber threats.

2016-02-10

China’s Dangerous View of Cyber Deterrence

PLA military doctrine: Cyber deterrence lacks credibility because cyber weapons have yet to be used in real warfare.

2016-02-02

Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. Australia seems poorly equipped to face that challenge.

2016-02-06

After The OPM Hack Security Clearances Will Now Be Done By The Pentagon

OPM Dumped: The US is shifting the responsibility for background investigations of sensitive personnel to the Defense Department.

2016-02-03

China & Indonesia Engage In Joint Cyber War Simulations

Indonesia and China's cooperation suggests that weaker nations cannot provide national cyber security on their own.

2016-01-29

Ukraine’s Power Grid Attacked By Russia

Highly destructive malware that infected at least three regional power authorities in Ukraine

2016-01-26

Ukraine Is Blaming Russian State Sponsored Hackers

The Ukrainian Government is suffering a series of power outages likely caused by cyber attacks caused by Russian hackers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.