GOVERNMENT > Local


« Back to News

2025-01-20

Balancing Progress & Protection In Britain's Public Services

Citizen Experience: Transforming public services is a delicate process - innovation needs to be balanced with data protection. By Kam Bhatoa

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-10-03

Bristol Will Spend £3.2M On Municipal Cyber Security

Bristol City Council is improving its cyber security through fears that an attack could damage delivery of critical public services.

2024-09-12

Which US States Are Most At Risk From Cyber Attacks? 

Colorado, New York, Nevada & California Top The List: Three out of four companies in the US are found to be at risk of a material cyber attack.

2024-08-28

California's Controversial AI Bill Will Soon Be Law

California’s AI Act is important as it will set the precedent for state guidelines across the US, laying down rules for developers working on GenAI.

2024-08-04

Millions Of US Voters Exposed Online

The exposed databases contained documents with lists of 4.6m available or active voters, absentees, early mail-in voting records & duplicate voters. 

2024-06-04

Germany’s Christian Democratic Party Attacked

A week before elections to the European Parliament, Germany's main opposition party has been forced offline by unidentified hackers.

2024-04-24

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

2024-04-11

City Of Leicester Council Attacked

Britain's Leicester City Council has suffered a sophisticated attack by a known ransomware group after evidence was posted on the Dark Web.

2024-02-01

Cyber Attack On Georgia's State Government

The District Attorney's office prosecuting Donald Trump for electoral interference gets caught up in a cyber attack on the state government.

2024-01-23

Cyber Attacks Hit Three English Councils At Once 

​​​​​​​Hackers have disrupted online operations in the county of Kent, affecting three town councils and taking down multiple online services.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Quantum Knight

Quantum Knight

Quantum Knight is the most performant commercial-grade embeddable cryptography. Lock down any resource from any location or device. Take control of your data now.