Zimbabwean Army Prepared For Cyber Warfare

The Zimbabwean army is ready to deal with those using the internet to destabilise the southern African country, the state-owned Herald newspaper reported.

Zimbabwe National Army commander, Lieutenant-General Phillip Valerio Sibanda, warned they were training their officials to detect and deal with internet threats.

“As an army, at our institution of training, we are training our officers to be able to deal with this new threat we call cyber warfare, where weapons, not necessarily guns, but basically information and communication technology, are being used to mobilise people to do wrong things. We will be equal to the task when the time comes,” Sibanda was quoted as saying.

The country has in recent months been hit by a wave of protests, as Zimbabweans demand that the government deal with the ongoing economic decline.

On July 6, the country came to an abrupt standstill as Zimbabweans downed tools, demanding better services. Many businesses, shops, schools, government departments and courts were closed. Public transport came to standstill. The protests were reportedly organised through social media networks like Twitter, Facebook, and WhatsApp.

A cleric in the southern part of the country galvanised thousands of Zimbabweans to stand up against the malfunctioning government of longtime ruler Robert Mugabe through a video he posted on his Facebook page in May.

Baptist pastor Evan Mawarire, 39, unwittingly began the This Flag movement when he expressed his frustration at the state of his nation, wearing the Zimbabwean flag around his neck.

Since then, a number of other social media movements have sprung up throughout the country.

This resulted in the ruling Zanu-PF government accusing the governments of Britain, United States of America, and France of interfering in the country’s internal affairs.

Ein News:  http://bit.ly/2aTWbWJ

« Internet of Things Will Turn Hacks Into Disasters
$5m Damages Payout For Huge Healthcare Data Breach »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications provides critical, tactical capabilities that inform decision making in the most challenging environments.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.

Exertis Cybersecurity

Exertis Cybersecurity

Exertis Cybersecurity is a sub-division of Exertis Enterprise. We provide market-leading cybersecurity solutions that help to address the cybersecurity challenges that organisations face today.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.