DARPA Has Invented The Ultimate Cyber Security

US Defense Advanced Project Research Agency DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS.

When the Internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half a decade ago, and obviously this breakthrough technology has come a long way. In just a few decades, the Internet has become the central and by far the largest source of information we have.

The amount of data on the Internet, be it science researches, personal profiles on social media or cat videos, makes it more and more difficult with each passing day to keep our personal information, to say nothing of commercial and state secrets, safe from prying eyes.

In answer to rising concerns over data breaches and cyber-terrorism, DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS. The details are complicated and full of tech jargon, but basically what DARPA is trying to create is an unhackable code. And for the time being, at least, they seem to be successful.

DARPA brought in a team of hackers to try and break into it. The HACMS team stored the code on a real-life, unmanned attack helicopter to see if their team could retrieve it. Even after the hackers were handed access to the actual source code of the helicopter, they were unable to penetrate the main systems and retrieve the code.

The implications are great. Cyber attacks are probably one of the top fears of most organizations, institutions and individuals in the connected world. DARPA might not be there quite yet, but the results are encouraging.

Cyber security has perhaps never been this important, and not just for individuals, who fear someone might hack their e-mails and steal their personal information. The battle raging in past months between governments and enterprises regarding encryption in personal devices and the right itself for encryption calls for progress in this field. In the US, which currently displays this in the clearest way, a battle is raging between companies like Apple, Google and Microsoft and the would-be surveillance state envisioned by some statesmen serving in Washington, DC.

I-HLS:

« Hackers-For-Hire Services Booming
Do The #PanamaPapers Make All Law Firms A Target? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.