DARPA Has Invented The Ultimate Cyber Security

US Defense Advanced Project Research Agency DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS.

When the Internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half a decade ago, and obviously this breakthrough technology has come a long way. In just a few decades, the Internet has become the central and by far the largest source of information we have.

The amount of data on the Internet, be it science researches, personal profiles on social media or cat videos, makes it more and more difficult with each passing day to keep our personal information, to say nothing of commercial and state secrets, safe from prying eyes.

In answer to rising concerns over data breaches and cyber-terrorism, DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS. The details are complicated and full of tech jargon, but basically what DARPA is trying to create is an unhackable code. And for the time being, at least, they seem to be successful.

DARPA brought in a team of hackers to try and break into it. The HACMS team stored the code on a real-life, unmanned attack helicopter to see if their team could retrieve it. Even after the hackers were handed access to the actual source code of the helicopter, they were unable to penetrate the main systems and retrieve the code.

The implications are great. Cyber attacks are probably one of the top fears of most organizations, institutions and individuals in the connected world. DARPA might not be there quite yet, but the results are encouraging.

Cyber security has perhaps never been this important, and not just for individuals, who fear someone might hack their e-mails and steal their personal information. The battle raging in past months between governments and enterprises regarding encryption in personal devices and the right itself for encryption calls for progress in this field. In the US, which currently displays this in the clearest way, a battle is raging between companies like Apple, Google and Microsoft and the would-be surveillance state envisioned by some statesmen serving in Washington, DC.

I-HLS:

« Hackers-For-Hire Services Booming
Do The #PanamaPapers Make All Law Firms A Target? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.