GOVERNMENT > Local


« Back to News

2018-11-02

Election Hacking Threatens US Mid-Terms

Modern election security means coming to grips with a daunting reality: US infrastructure is too fragmented, outdated & vulnerable to be secured.

2018-10-10

California Bans 'Secret' Election Bots

California has adopted legislation which bans the use of undeclared bots during elections.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

2018-09-02

Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

2018-06-07

‘Important Information About Your Credit Card’

No, it is not from your credit card company. It is a phishing email sent to you by criminals designed to steal your credit card numbers and identity.

2018-05-22

A Guide To Preventing Charity Cybercrime

Specialist insurer finds that 17% of UK charities have experienced cyber attacks, with ransomware top of the list whilst 63% worry about cyber crime.

2018-03-28

US City Of Atlanta Suffers An Attack

Atlanta has come under attack in the first known incident of ransomware being used against multiple municipal operations.

2018-03-22

Cybercrime Costs Londoners £26m Every Month

Scotland Yard say Londoners are losing an average of £26 million a month in cyber attacks on the capital's businesses and citizens.

2018-01-29

India’s Political Parties Fighting A Cyberwar

Indian regional elections are highly contested and this year the arguments in Karnataka State are spurring big growth in social media traffic.

2017-12-05

US States Turning To Insurance

Local Government has proven vulnerable. Now more US states are buying cyber insurance to protect themselves from the consequences of a breach.

2017-10-20

Firefighters Get AR Powered Glasses

Firefighters could go further into hazardous situations and exit safely using Augmented Reality (AR) glasses in development at BAE Systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

BSIMM

BSIMM

The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Empow Cyber Security

Empow Cyber Security

Empow has developed a way for enterprises to orchestrate their security infrastructure, get the most out of each security product, and better mitigate attacks, while using fewer resources to do so.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.