GOVERNMENT > Defence


« Back to News

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

2015-10-26

Israel: The Cyber Power

Israel is a high tech epicenter built around Internet security, anti-virus software, and other cyber defense technologies.

2015-10-26

NATO Forces Shoot Down a Russian Drone Over Turkey.

As the Internet examines pictures of an alleged Russian surveillance drone shot down by Turkish jets, Russia says, ‘What drone?’

2015-10-23

Cyber Wars Won't Replace or Trigger Traditional Wars

A cyber war is not capable of triggering a traditional war nor has the ability to replace it in the near future. So says US Foreign Policy guru.

2015-10-21

America Dominates Drones

The business of military drone-building is booming.

2015-10-21

US Concerns Over Kremlin Links to Cyber Gangs

Moscow has long been known to source its technology, world-class hacking talent and intelligence information from cyber crime rings.

2015-10-21

Russia - NATO Cyber War Heats Up

Cyberattacks have become far more aggressive and numerous since NATO and Russia recommenced hostilities with each other.

2015-10-09

These Facts Explain the Threat of Cyber Warfare

Five factors explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

2015-10-05

India Discusses Cyber 9/11 Prevention

India is worried that it's Banking, IT & Service sectors are vulnerable to the threat of serious cyber attacks.

2015-10-05

Integrating Video Analytics Technologies At Airports.

There is a critical need for finding solutions for more advanced security in airports.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.