Countries

Spain’s national security strategy to include risk of disinformation campaigns

Source : El País Latest government document does not specifically mention Russia, but alludes to recent interference in Catalan crisis and Brexit Spain’s latest National Security Strategy document, which sets out the risks to the country’s...

The House Intelligence Committee this morning will hold a rare public markup of its...

    Source and texts The House Intelligence Committee

NATO mulls ‘offensive defense’ with cyber warfare rules

Source Reuters A group of NATO allies are considering a more muscular response to state-sponsored computer hackers that could involve using cyber attacks to bring down enemy networks, officials said. The United States, Britain, Germany, Norway,...

Wikileaks publishes Project Protego.CIA’s secret missile control system

Source: wikileaks   The Protego project is a PIC-based missile control system that was developed by Raytheon. The documents indicate that the system is installed on-board a Pratt & Whitney aircraft (PWA) equipped with missile launch...

EU cyber defense Project

eda.europa.eu Fact Sheet: EDA Workstrand goals The Cyber Security Strategy for the European Union, which was released in February 2013 and endorsed by the Council in June 2013, emphasises, “Cyber security efforts in the EU also involve...

First cyber exercise at EU ministerial level focuses on strategic decision-making

  https://www.eda.europa.eu EU Defence Ministers today participate in “EU CYBRID 2017”, a strategic table-top cyber defence exercise. The exercise, the first of its kind, is organised by the Estonian Presidency of the Council of the European...

Which countries are most exposed to cyber threats, surveillance?

Cybersecurity experts often talk about the level of exposure, or the amount of “attack surface,” when describing security vulnerabilities and cyber risks. Both factors affect the likelihood that an individual or organization will fall...

Guide to Russia’s Infrastructure Hacking Teams

Since reports first surfaced that hackers targeted more than a dozen American energy utilities, including a Kansas nuclear power plant, the cybersecurity community has dug into the surrounding evidence to determine the culprits. Without...

“Digital Kazakhstan” state program

In today's world, digital technology plays an increasingly important role in the development of countries economy. Even today, more than 40% of the world population has access to the Internet, and almost every 7...

Cyberwarfare: Royal Navy now training sailors to use AI and IoT to counter threats

The Royal Navy's training exercise, dubbed Information Warrior 17, will see forces trained for battle with tech weapons. The Royal Navy is all set to train its warriors on how to counter and conquer threats...

Must Read

Facebook Auto Publish Powered By : XYZScripts.com

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close