GOVERNMENT > Defence


« Back to News

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-12

Finland Hit By Cyber Attacks

The Finnish Foreign and Defence ministries' websites were knocked offline & the Ministry of Defence tweeted that its website was under attack.

2022-04-06

The Pentagon Gets $250m Extra To Spend On AI

The Pentagon’s AI and Data Acceleration Initiative is intended to speed up the adoption of ArtificiaI Intelligence across US Combat Commands.

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-14

The US Military Want 5G Fast

Military communications need the rapid transfer of large quantities of data that 5G technology enables, combined with high levels of resilience.

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-03-02

The Online Battle In Ukraine

Ukraine's invasion is Europe's first experience of conflict in the digital age. Social media, the Internet & Telecoms networks have been weaponised.

2022-02-25

New Tools To Simulate Electronic Warfare

Swarming Munition: The US Air Force is testing autonomous software to simulate electronic warfare in complex, multiple target settings.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

2022-02-16

Military Operating Systems Bring AI To The Battlefield

USA vs China: There is an arms race in Artificial Intelligence with the aim to gain decision-making dominance on the battlefield of the future.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Issue53

Issue53

Issue53 is a complete technology solution provider offering Managed IT services, Network Security, Cloud Computing, and Data Backup and Recovery.