GOVERNMENT > National


« Back to News

2015-07-31

UK MPs are No longer Exempt from Surveillance

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in the era of bulk interception.

2015-07-29

Germany's New Infrastructure Cybersecurity Law

Federal agencies & providers of essential public services will have to comply with minimum standards of cyber-security.

2015-07-28

Will Enforcing Encryption Backdoors Even Work?

Backdoors are “unworkable in practice, raise enormous legal and ethical questions & would undo progress on security...'

2015-07-27

Internet of Things: A Mass Surveillance Infrastructure

‘The most powerful political tool ever created’

2015-07-24

UK Government £1m scheme for SMEs to Fight Cyber Attacks

Protecting businesses against cyber attack and making the UK the safest place in world to do business online.

2015-07-18

The Focus on Terror has Distorted the Debate on Encryption

The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski

2015-07-17

Leveraging Drones to Improve Nuclear Facility Security and Safety

Drones currently represent equal parts threat and opportunity for nuclear facilities. Opinion by Caroline Baylon

2015-07-15

WikiLeaks and the NSA’s Hobby of Spying On Allies

U.S. economic espionage extends to the key European institutions and issues such as the EU Central Bank and Greek crisis

2015-07-15

FBI - Encryption is Great as Long as it Still Lets Us In

Too-tough-to-crack encryption poses a threat to national security.

2015-07-10

Espionage Lessons from the OPM Hack

Three lessons emerge that might give us hope for a secure future.

2015-07-07

UK’s Home Secretary named Internet Villain

Crowned 'Internet Villain' of the year by the Internet Service Providers Association, one of the UK's biggest Internet lobbying groups.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab conducts research into predictive security analytics.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.