GOVERNMENT > Local


« Back to News

2019-11-25

Louisiana Hit With A Ransom Attack

The nations of Crimea, Georgia and Ukraine. The cities of Atlanta and Johannesberg. Now, the state government of Louisiana is knocked offline.

2019-11-18

British Police At War Against Cyber Crime

Kent Police say half of crimes committed in the county have some cyber element, as criminals use the internet to exploit victims and steal data.

2019-11-05

Hackers Demand Ransom After Stealing Johannesburg's Data

The attack on South Africa’s financial centre, accounting for 16% of national GDP has delivered a noticeable blow to the country’s economy.

2019-09-17

Smart Cities Call For Mobile Solutions

App-based physical security intelligence & access control technology that helps to build secure smart cities, campuses and perimeters.

2019-08-26

Ransomware Hits Texas For Six

Over 20 local governments have suffered a co-ordinated attack from somebody who is demanding a $multimillion ransom.

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2019-07-08

Developing Smart Cities In Practice

Security and privacy issues plus a lack of IoT interoperability are seen as a major factors in speeding deployment of Smart City technology.

2019-06-24

Turning Amsterdam Into A Smart City

Intelligent Mobility: Amsterdam and MIT are working together using 16th Century technology to produce 21st Century solutions.

2019-06-24

Florida Municipality Suffers Cyber Extortion

Not So Smart Cities: The wave of ransom attacks on local government that began in Atlanta is being replicated in vulnerable small municipalities.

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

2018-11-13

Schoolboy Hacked Mock Florida Election Site In 10 Minutes

As votes cast in Florida are re-counted amid allegations of electoral fraud, it turns out that an 11 year old could hack the state's system.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Coro Cybersecurity

Coro Cybersecurity

Coro (previously Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Rule4

Rule4

Rule4 is a global professional services firm that provides practical, real-world knowledge and solutions in areas including cybersecurity, AI, Machine Learning and industrial control systems.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.