DARPA Has Invented The Ultimate Cyber Security

US Defense Advanced Project Research Agency DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS.

When the Internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half a decade ago, and obviously this breakthrough technology has come a long way. In just a few decades, the Internet has become the central and by far the largest source of information we have.

The amount of data on the Internet, be it science researches, personal profiles on social media or cat videos, makes it more and more difficult with each passing day to keep our personal information, to say nothing of commercial and state secrets, safe from prying eyes.

In answer to rising concerns over data breaches and cyber-terrorism, DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS. The details are complicated and full of tech jargon, but basically what DARPA is trying to create is an unhackable code. And for the time being, at least, they seem to be successful.

DARPA brought in a team of hackers to try and break into it. The HACMS team stored the code on a real-life, unmanned attack helicopter to see if their team could retrieve it. Even after the hackers were handed access to the actual source code of the helicopter, they were unable to penetrate the main systems and retrieve the code.

The implications are great. Cyber attacks are probably one of the top fears of most organizations, institutions and individuals in the connected world. DARPA might not be there quite yet, but the results are encouraging.

Cyber security has perhaps never been this important, and not just for individuals, who fear someone might hack their e-mails and steal their personal information. The battle raging in past months between governments and enterprises regarding encryption in personal devices and the right itself for encryption calls for progress in this field. In the US, which currently displays this in the clearest way, a battle is raging between companies like Apple, Google and Microsoft and the would-be surveillance state envisioned by some statesmen serving in Washington, DC.

I-HLS:

« Hackers-For-Hire Services Booming
Do The #PanamaPapers Make All Law Firms A Target? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.