GOVERNMENT > National


« Back to News

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-16

Israeli Government Websites Knocked Offline

State Of Emergency: Israeli government websites were taken offline in one of the largest cyber attacks ever launched against the country.

2022-03-21

In Britain 'Cyberflashing’ Is Now A Crime

Sending unsolicited sexual images via social media, dating apps, as well as data sharing tools like Bluetooth and Airdrop, will get two years in jail.

2022-03-22

Phishing Attack On US Government Linked To Chinese Hackers

At least two Chinese state-sponsored advanced persistent threat groups have been identied as behind attacks on US and EU targets.

2022-03-21

Ukraine's 'IT Army' Risks Being Hijacked By Malware

A malware campaign is exploiting people's willingness to support Ukraine against Russian invasion to infect them with malicious Trojans.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

2022-02-16

Cyber Security Regulations For Smart Devices

Smartphones, TVs, Speakers & Routers: The British government has introduced new legislation to better protect consumers' IoT devices.

2022-02-15

Russian Cyber Attacks On Ukraine Increase

Cyber attacks will form part of a broad campaign if Russia invades Ukraine, with malware and online disinformation among the weapons deployed.

2022-02-15

British Foreign Office Hacked

Britain's Foreign, Commonwealth and Development Office needed 'urgent support' when unidentified hackers got inside their network systems.

2022-02-09

Britain Aims To Protect Children From Online Pornography

Pornography websites must carry out age checks & require British users to provide credit card or passport details to prove they are over 18.

2022-02-07

Spy Chief Warns US Government Is Classifying Too Much Data

With 18 different and sometimes competing national intelligence agencies, the US is finding that sharing critical information is too difficult.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.