GOVERNMENT > Defence


« Back to News

2015-10-21

Russia - NATO Cyber War Heats Up

Cyberattacks have become far more aggressive and numerous since NATO and Russia recommenced hostilities with each other.

2015-10-09

These Facts Explain the Threat of Cyber Warfare

Five factors explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

2015-10-05

India Discusses Cyber 9/11 Prevention

India is worried that it's Banking, IT & Service sectors are vulnerable to the threat of serious cyber attacks.

2015-10-05

Integrating Video Analytics Technologies At Airports.

There is a critical need for finding solutions for more advanced security in airports.

2015-10-02

Social Media and the 'Information War’- Russia is Winning

The Kremlin wields a vast media apparatus to distort information, promote conspiracy theories & obfuscate observers about the crisis in Ukraine.

2015-10-02

Cyberwar Right Here, Right Now...

The World We Live In Now: Where cyber attacks are real and cyber wars could cause immeasurable damage.

2015-09-28

The U.S Is Losing the Cyber War

The Hacking of America: The Office of Personnel Management Hack comes after years of the U.S. passivity despite repeated digital attacks.

2015-09-27

GCHQ Has Spied on Every Web User, Ever…

Nothing to hide, nothing to fear? GCHQ and Operation Karma Police: Collecting the browsing habits of "every visible user on the Internet"

2015-09-25

Cyberspace: The New Frontier in Warfare

Modern attackers will destroy enemy sensors, communications & decision-making loops. Opinion By Espen Barth Eide & Anja Kaspersen

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.

Maveris

Maveris

Maveris is an IT and cybersecurity company committed to helping organizations create secure digital solutions to accelerate their mission.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.