GOVERNMENT > Defence


« Back to News

2021-08-25

British Military Aim To Reduce Their Attack Surface

Reducing Vulnerabilities: Britain's defence sector presents a large target area for cyber attackers to penetrate and disrupt UK military operations.

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

2021-08-09

EU & NATO Agree To Confront The Chinese Cyber Threat

This new alliance will share intelligence on cyber threats and collaborate on network defenses and cooperative security, but not on retaliation.

2021-08-05

China’s National Cyber Security Powerhouse Strategy

China aims to reduce its reliance on foreign technology and is building a national cyber security centre to produce 2,500 graduates each year.

2021-07-26

Military Intelligence: British Army Operation Using AI

British armed forces will increasingly use AI to predict adversaries’ behaviour, reconnaissance and relay real-time intelligence from the battlefield.

2021-07-19

IISS: Cyber Capabilities & National Power Rankings

Cyber capability underpins military power and can radically affect national decision-making. Currently the US has superiority over numerous contenders.

2021-07-05

Pentagon CISO Accused Of Leaking Classified Intel

The top Pentagon official, who was overseeing its new cyber security initiative, has been placed on indefinite leave while being investigated.

2021-06-28

Russia Wants A Deal With The US On Cyber Security

President Putin says he could reach an agreement with the US on the rules of behavior in the fields of strategic stability and cyber security.

2021-06-21

Drones Kill Without Human Control

Turkish built autonomous drones with an explosive charge are now reported working without human control as battlefield killers in Libya.

2021-06-21

NATO Warns Of Military Response To Cyber Attacks

Moscow’s “pattern of aggressive actions” remains a “great concern” to the NATO alliance, which has repeated a commitment to collective retaliation.

2021-06-17

Cyber Attacks Are The New Cold War

President Biden has had a meeting with President Putin to talk about cyber security and how the modern-day cold war includes cyber attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.