Cyber Defence and Security

Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Defence IQ brings you exclusive online news on cyber defence and military cyber security. We have knowledge on cyber threat intelligence developments, incident response and ICS for critical national infrastructure.

Contributor: NATO CCDCOE
Posted: 08/11/2016
The Democratic National Convention hack constitutes a grave interference in the electoral process of a nation. Given the unprecedented level of attribution to Russian authorities, authors Matthijs Veenendaal, Kadri Kaska, Henry Rõigas and Can Kasapoglu analyse this attack in the broader setting of the use of cyber capabilities as part of influence operations. A lack of response, the analysis concludes, contributes to the already existing deterrence problem and even encourages further aggression. This article first appeared on NATO CCDCOE. Full Article »
Posted: 04/05/2013
Interview: Brian Contos, Solera Networks

Brian Contos, Worldwide VP of Sales Engineering and Professional Services at Solera Networks, pinpoints where the shift in the cyber threat vector lies and how his company provides a solution to a wide range of concerns.


Full Video »
Posted: 04/01/2014
on point podcast series
ICS Cyber Security Live Hacking Exercise: Meet The HostICS Cyber Security will be hosting a two-day live hacking exercise specifically to enhance participants' knowledge of protecting industrial control systems within a real-time, realistic environment. This not-to-be-missed experience will be hosted by Matt Luallen, president and co-founder of Full Podcast »
Contributor: Richard de Silva
Posted: 07/05/2016
Welcome to the summer 2016 issue of the Cyber IQ Review. The past few months have been as active as ever when it comes to the increase and emergence of sophisticated threats to our digital information. Headline issues have spanned from flaws in daily security measures to global-scale controversy and serious commercial fallout. Full Sector Report »