GOVERNMENT > Defence


« Back to News

2020-03-31

The US Is Facing A Catastrophic Cyber Attack

The US is “dangerously insecure in cyber,” and needs to take a series of actions to avert attacks on critical infrastructure & financial services.

2020-03-24

Fronton: A Secret Russian Tool To Shut Down The Internet

Russia's national spy agency has powerful new tools that can shut down internet services by tapping into IoT connected smart devices.

2020-03-03

Where Is Iran's Cyber Response To It's General's Assassination?

Iran's threatened response to the US killing of their top military leader has yes to materialise, although their state- sponsored hackers are busy.

2020-03-17

New UK Cyber Force Targets Terror Groups

At Last: A specialist British cyber force of military & civilian hackers who can target hostile states and terror groups is ready to get going.

2020-03-16

Iran's Cutting Edge Cyberwar Capabilities

Iran has the skills to conduct attacks against its enemies across numerous sectors, including energy, financial services & critical infrastructure.

2020-03-02

The New Battlefield

The nature of warfare is changing and the risk is moving from physical disruption to a much more complex and unpredictable cyber environment.

2020-02-11

US Government Cyber Security Still Needs Work

The US State Department has consistently failed to secure its IT systems from cyber attacks, reflecting a general mismanagement of resources.

2020-02-10

Big Cyber Attack Hits Iran

Digital Fortress: Internet connectivity in Iran dropped to 75% after a 'powerful' DDoS attack that targeted Iran's telecom services this weekend.

2020-02-04

Email Malware Targeting US Senators & Military

A powerful email malware known as Emotet that is primarily spread through spam emails is being used to target US government & military systems.

2020-01-24

Electric Grids Targeted For Cyber Attacks

Some of the world's most dangerous hackers have zeroed in on the US power sector and the risk of a destructive attack is going up.

2020-01-24

US Cyber Command Hacked ISIS

US Cyber Command operations to disrupt ISIS online networks since 2106 were largely successful but there were significant shortcomings.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Infotecs

Infotecs

Infotecs ViPNet Security and Threat Intelligence Platform provides complete multi-layer security in one cost-effective solution that supports true endpoint-to-endpoint security.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

National Security Services Group (NSSG)

National Security Services Group (NSSG)

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

National Cybersecurity Consortium (NCC)

National Cybersecurity Consortium (NCC)

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.