GOVERNMENT > Defence


« Back to News

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

2015-09-02

Cyber Attack on US Power Grid Will Cost $1 Trillion

Thirty two percent of U.S emergency responses to cyber security threats occurred in the energy sector.

2015-09-01

Psychologists Work for GCHQ Deception Unit

Should psychologists should offer their expertise to spy agencies engaged in deception & propaganda?

2015-08-27

A Drone That Hacks Computers

Aerial Assault: A quadcopter flying hacker that scans the world below for insecure devices and vulnerable WiFi ports.

2015-08-27

Hackers to Military: Replace Us with Robots –Don’t Think So!

Next year’s DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.

2015-08-26

Six Ways Cyber Attackers Are Changing Tactics

Adversaries are becoming more sophisticated not only in their approaches to launching attacks, but also in evading detection.

2015-08-25

Legal Issues Of Cyber War Are Big & Complex

What does it it take to trigger self-defense in cyberspace, and what does it mean for a nation-state to have 'effective control' of a hacker?

2015-08-19

Russia, China & U.S. Engage in Cyber War

The cyber warfare between the U.S.A, Russia and China is part of an overall epoch-defining conflict between the three nations.

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-08-08

Could Cyberwar Knock Us Back to the Stone Age?

If there were a major cyberwar, just how bad would it be? Could modern civilization survive? A thought experiment by David Gewirtz.

2015-08-04

ISIS's Threat: A Cyber War Against America

ISIS has over 20,000 English-language Twitter followers "that...makes it harder to determine who's going to succumb to the propaganda."

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Rite-Solutions

Rite-Solutions

Rite-Solutions is an award-winning software development, systems engineering, and information technology firm.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.