The Danish government has unveiled a $240 million to protect Authorities, businesses and individuals as part of their strategy for cyber and information security. The strategy consists of 25 concrete initiatives to strengthen society's defense against cyber-attacks and cybercriminals
Mitsubishi Heavy Industries (MHI), Nippon Telegraph and Telephone (NTT) and associated companies have commercialized InteRSePT1, a jointly developed cyber security technology for critical infrastructure control systems. InteRSePT1 provides real-time anomaly detection and response for unknown cyber-attacks, contributing to safe and secure system operations
Raytheon Company announced an alliance with Virsec to bring commercial cybersecurity tools to global government and critical infrastructure customers. Virsec's patented Trusted Execution technology protects networks by detecting deviations in software applications caused by cyber intrusions
The Australian Defense Department has banned its employees from using WeChat, an instant messaging app that's huge in China, likely related to data security fears within Australia. Employees at the Australian Defense Department have been prohibited from going on WeChat
Leonardo and Nozomi Networks, the leader in real-time cybersecurity and operational visibility for industrial control systems (ICS), have partnered to implement the safety of industrial control systems and critical infrastructure, with the help of deep network visibility, non-intrusive monitoring and continuous threat detection. The partnership will provide Nozomi Networks deep network...
Britain has held the Russian government responsible for the cyber attacks on the businesses across Europe last year. British Foreign Minister Tariq Ahmad said in a statement: "the U
An international gang of cyber criminals accused of stealing and selling credit card and personal identity data has been busted with the arrest of a Russian national in Bangkok on Friday. The Thailand Police have detained the Russian national, Sergey Sergeyvich Medvedev believed to be the No
Indonesias cyber defence organization, the State Code and Cyber Agency (BSSN) said it will team up with Australian counterpart in creating standard of handling cyber attacks. "Yesterday we organized a workshop with friends from Australia and we will cooperate technically at least in incident handling, in creating the standard," BSSN spokesman Anton Setiawan told ANTARA News Agency on the sidelines of Indonesia-Australia Digital Forum 2018 here on Wednesday
Russia has integrated electronic warfare capabilities into its conventional warfare assets to achieve spectacular results in real battle scenarios such as in Syria, a leading expert on the Kremlins armed forces said Monday. Roger McDermott, a senior research fellow in war studies at Kings College London cited their recent response to a drone swarm attack on a Russian air base and naval facility in Syria, he said, “all were brought down” by conventional air defense or jamming using electronic warfare tools
Belgian Defence has ordered Termas ylon Integrated Dispensing System (PIDS+) configuration pylons for its fleet of F-16 fighter jets. According to company press release, all of the original European Participating Air Forces (EPAF) countries – Denmark, Norway, the Netherlands, and Belgium – have now ordered the Terma PIDS+ pylons for their F-16s, and all of them are equipped with the Hensoldt AAR-60(V)2 Missile Warning System (MWS)
Stryke Industries LLC announced Thursday the contract awarded by the US Army to supply artificial intelligence technology, as part of the U.S
Israels largest bank Poalim Bank and prime aerospace and aviation manufacturer Israel Aerospace Industries (IAI) have announced collaboration for leveraging Blockchain technology to create innovative cyber solutions. The joint research undertaken by the two companies will examine how Blockchain, the innovative technology at the basis of cryptocurrencies such as Bitcoin, could be used for developing innovative cyber security solutions, such as secure transmission of information between services and supply chains, user authentication, critical devices and elements that run with no human intervention and additional solutions for the cyber challenges in a hyper-connected world