GOVERNMENT > National


« Back to News

2015-12-28

The True Cost of Surveillance

New legislation to regulate spying in the UK seeks to combine numerous existing powers and make them all subject to coherent oversight.

2015-12-15

Cyber Warfare: An Integral Part of Modern Politics

Cyber-operations are being used for a wide range of information warfare & intelligence gathering purposes, according to NATO.

2015-12-14

French Government Proposals To Block Tor and Forbid Free Wi-Fi

Le Monde reports two proposals for legislation, one around the state of emergency, and the other related to counterterrorism measures.

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-09

First Ever EU Rules On Cybersecurity

Europe's critical digital infrastructure will be required to meet basic security standards.

2015-12-09

Cybersecurity Is A Big Government Problem

Constant vigilance is required to protect US government systems. Unfortunately, these same systems might not be up to the task.

2015-12-09

Digital Entrepreneurship

The European Commission wants to stimulate the smart use of digital technologies to create new businesses.

2015-12-06

Cyber Warfare Is Integral To Modern International Politics

Cyber-operations are being used for information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine.

2015-12-04

N. Korea Employs Grads for Cyber Warfare

North Korea is reportedly recruiting graduates from Pyongyang University of Science & Technology for cyber warfare.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-11-24

UK Crime Rate Rises Sharply as Cybercrime is Included

It is estimated there were 2.5m “computer misuse” incidents last year, where a victim’s computer is infected by a virus.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

SGS Brightsight

SGS Brightsight

SGS Brightsight is the largest independent security evaluation lab in the world, with ten recognised labs worldwide.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.

Triam Security

Triam Security

Triam Security are on a mission to make software supply chain security effortless, effective, and invisible - so developers can move fast without leaving security behind.