GOVERNMENT > National


« Back to News

2015-05-26

EU’s 'point of no return' if Internet Firms Not Regulated

Amazon, Etsy and Booking.com are all named in a leaked document as having 'undue power' over their markets.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

Snowden Sees Victory – But it’s From a Distance

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

2015-05-19

Russia & China Grow Closer With New Cyber Agreement

Russia and China have vowed not to launch cyber attacks against each other, leaving more time to attack other targets.

2015-05-19

Iran Ministry Of Defense Hacked By Saudi Hacker

Saudi RxR HaCker hacked & defaced the official website of Iranian Ministry of Defense.

2015-05-12

Kaspersky Denies KGB Connections

Do Kaspersky Lab have ties to Russia's Federal Security Service (FSB)?

2015-05-12

Cyber War and Peace

Opinion by Javier Solana, former General Secretary NATO.

2015-05-12

Impact of New EU Data Legislation Not Widely Understood

A third of public & private sector professionals are unaware of forthcoming EU General Data Protection Regulation.

2015-05-06

Anonymous Hackers Taking On the Kremlin

Anonymous International release an online archive of around 40,000 text messages belonging to a powerful Kremlin official.

2015-05-04

US Defense Secretary Defines New Cybersecurity Strategy

US Department of Defense's new cybersecurity strategy includes a "renewed partnership" with the technology industry.

2015-05-04

Is Germany Paranoid About US Spying ?

The idea of personal data privacy is deeply ingrained in German culture & recent events have deepened suspicions about the US.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

MinerEye

MinerEye

MinerEye safeguards confidential and personal data for the world’s leading enterprises, including leading banks and technology vendors.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.