GOVERNMENT > National


« Back to News

2025-09-08

Typhoon In The Fifth Domain: China's Evolving Cyber Strategy

By exploiting opponent's fragmented critical infrastructure, China's nation-state hackers aim to dominate the "fifth domain" of cyberspace.

2025-08-25

British Government Withdraws Demand For Access To Apple Users' Data

In response to pressure from the US, the UK has withdrawn regulations that would empower it to have investigatory access to users' data.

2025-08-17

Canada’s Parliament Suffers Data Breach

Staff at the House of Commons are warned to be especially vigilant for breached information being used to target & possibly impersonate parliamentarians. 

2025-08-14

Critical New Zealand Data Found Posted On The Dark Web

Thousands of credentials for employees from government departments, banks &healthcare organisations can now be found on the Dark Web.

2025-07-29

Holes In The Road To The UK’s Digital Future

Fixing The Foundations: Strengthening national resilience will require a multi-layered approach & investing in modernisation. By Richard Giblin

2025-07-28

VPN Demand Surges As British Online Safety Law Takes Effect

Law Enforces Age Verification: A 1,400% surge in VPN sign-ups, as users seek to bypass child protection restrictions, raises privacy concerns.

2025-07-17

Trump Orders Federal Cyber Security Responsibilities Be Reduced

Removing federal cyber security responsibilities & pushing some of those responsibilities to the private sector may dilute national security.

2025-07-18

Britain Imposes Sanctions On Russian Cyber Spies

Russia’s military intelligence agency stands accused of a sustained campaign of cyberattacks and hybrid warfare aimed at destabilizing Europe.

2025-07-01

Swiss Health Foundation Cyber Attack Exposes Federal Data

Ransomware Strike Hits Radix: A breach by the Sarcoma ransomware group has leaked 1.3TB of data, raising concerns over government security.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-05-28

Eight Best Solutions For Managing Compliance In Government Contracting

Make Compliance A Strategic Advantage: Robust platforms & specialized tools are the best solutions for managing compliance in government contracting.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.