GOVERNMENT > National


« Back to News

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2018-02-06

Russia's New Generation Of Military Robots

Russian defence technology is inching ahead of its competition in designing, testing & deploying a wide variety of unmanned systems harnessing AI.

2018-02-06

Prime Minister Wants A 'fake news' Rapid Response Team

British Prime Minister Theresa May wants a "fake news" rapid response unit to monitor social media and challenge false stories.

2018-02-09

Killer Robots Will Be Ubiquitous In The US Army

In future, every US combat vehicle is going to have the capability to be robotic and to deliver 'solid lethality'.

2018-01-30

Cyber Attacks Rank Alongside Natural Disasters

A big cyber attack could cost as much as a major hurricane and like extreme weather and other natural disasters, cyber attacks are a global issue.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

2018-01-30

Looming Cyber Threats From Russia & N. Korea

Threats from Russia & N.Korea have increased and cybercriminals have improved their tactics, techniques & procedures, according to Flashpoint.

2018-01-26

Russia Will Create Its Own Internet

Russia is declaring independence from ICANN and will set up its own network of root servers for its domestic market and those of other BRIC nations.

2018-01-25

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks

An extreme response to an extreme problem: Why use hack-back tactics when you can drop a nuke on your cyber attackers?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.