DARPA Has Invented The Ultimate Cyber Security

US Defense Advanced Project Research Agency DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS.

When the Internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half a decade ago, and obviously this breakthrough technology has come a long way. In just a few decades, the Internet has become the central and by far the largest source of information we have.

The amount of data on the Internet, be it science researches, personal profiles on social media or cat videos, makes it more and more difficult with each passing day to keep our personal information, to say nothing of commercial and state secrets, safe from prying eyes.

In answer to rising concerns over data breaches and cyber-terrorism, DARPA has spun off a new project called High-Assurance Cyber Military Systems, or HACMS. The details are complicated and full of tech jargon, but basically what DARPA is trying to create is an unhackable code. And for the time being, at least, they seem to be successful.

DARPA brought in a team of hackers to try and break into it. The HACMS team stored the code on a real-life, unmanned attack helicopter to see if their team could retrieve it. Even after the hackers were handed access to the actual source code of the helicopter, they were unable to penetrate the main systems and retrieve the code.

The implications are great. Cyber attacks are probably one of the top fears of most organizations, institutions and individuals in the connected world. DARPA might not be there quite yet, but the results are encouraging.

Cyber security has perhaps never been this important, and not just for individuals, who fear someone might hack their e-mails and steal their personal information. The battle raging in past months between governments and enterprises regarding encryption in personal devices and the right itself for encryption calls for progress in this field. In the US, which currently displays this in the clearest way, a battle is raging between companies like Apple, Google and Microsoft and the would-be surveillance state envisioned by some statesmen serving in Washington, DC.

I-HLS:

« Hackers-For-Hire Services Booming
Do The #PanamaPapers Make All Law Firms A Target? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.