GOVERNMENT > Defence


« Back to News

2021-02-03

Enemy Action - The Distinctive Features Of Cyber Warfare

Operating behind false IP addresses, foreign servers and aliases, attackers can act with almost complete anonymity and relative impunity.

2021-01-04

AI Is The New Weapon In The Cyber Arms Race

Many experts believe that ArtificiaI Intelligence will have a significant impact on warfare and will transform how armed conflict is conducted.

2020-12-23

Plans To Divide US Cyber Command And The NSA

Outgoing Pentagon officials are seeking fast-track approval to divide the leadership of the National Security Agency and US Cyber Command.

2020-12-07

Russian Hackers Lured With Honeypots

NATO is using deception against hackers, who, believing their intrusions to be successful, are actually exposed to surveillance and analysis.

2020-11-27

Cyber Security Has Become Critical For National Security

Critical national infrastructure, both public and private, is increasingly interconnected and has become susceptible to predatory cyberattacks.

2020-11-09

Cyber Warfare Is The New Frontier

The Future Of Conflict: In an accelerating cyber arms race, there is a lack of clear international rules governing the use of cyber weapons.

2020-11-05

US Cyber Command Were Running An 'Election Special'

Hunt Forward: A special operation against malicious foreign cyber actors to seek out hackers from Russia, China well before the US election.

2020-11-05

British Military Gets A Defensive Cyber Security Platform

Researchers have shared expertise to enable the cyber security platform to make predictions about the likely next steps of an evolving attack.

2020-11-03

US Invests Big In Space Force Cyber Security

US Space Command will dramatically increase the size of its cybersecurity team and are planning to add an additional thousand new personnel.

2020-11-03

Securing AI In Military Systems

Military robots will in the future incorporate AI that could make them capable of undertaking missions on their own. They must be immune to hackers.

2020-10-19

The Emerging Domain Of Cyber War

Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

SecBI

SecBI

SecBI provides an advanced threat detection system that uncovers the full scope of cyber attacks, including all affected users, domains, assets, and more.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

Entisys360

Entisys360

Entisys360 is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.