GOVERNMENT > Defence


« Back to News

2015-06-29

Next World War - First, Cyberwar. Second, Shooting War

The more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field.

2015-06-27

5 Facts that Explain Cyber Warfare

The biggest threat to national security these days comes from a computer with a simple Internet connection.

2015-06-27

Drone Operators’ Jobs Are Safe From Robots…For Now

It’s not that machines can’t see & it’s not that they can’t think. They lack imagination & that ability is central to target recognition.

2015-06-27

NSA Chief: Don’t Assume China Hacked OPM

The cybersecurity group FireEye says it’s “highly confident” that Chinese hackers did it but Admiral Rogers is not so sure.

2015-06-17

UK MOD to Build Open Source Analytics Platform

The MOD wants a new open source analytics platform to help understand its data.

2015-06-15

North Korea Threatens US with Cyberattacks

North Korea has responded to reports that it was the target of a Stuxnet cyber attack by threatening a cyber attack against the U.S.

2015-06-16

US Government Employee Hack & the Future of Warfare

The massive hack of the US federal government may have compromised personal information belonging to as many 14 million people.

2015-06-09

US Stuxnet Attack Against N. Korea Failed

Fail: Stuxnet virus used to attack North Korea's nuclear weapons program five years ago.

2015-06-08

Pentagon To Relaunch $475 Million Cyber Effort

After cancelling its search for bids on a five-year outsourcing contract, US Cyber Command say a retooled version will be out by October.

2015-06-06

Russia's Greatest Weapon May Be Its Hackers

In hacker jargon, it’s called a “cyber-to-physical effect.” It’s when a hacker reaches out from the virtual world into the real one, often with catastrophic consequences.

2015-06-01

"Torus" Reveals an Expansion in 5 Eyes Surveillance.

A great eavesdropping expansion has been taking place in plain sight.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

ixAssociates

ixAssociates

ixAssociates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.