GOVERNMENT > National


« Back to News

2015-07-18

The Focus on Terror has Distorted the Debate on Encryption

The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski

2015-07-17

Leveraging Drones to Improve Nuclear Facility Security and Safety

Drones currently represent equal parts threat and opportunity for nuclear facilities. Opinion by Caroline Baylon

2015-07-15

WikiLeaks and the NSA’s Hobby of Spying On Allies

U.S. economic espionage extends to the key European institutions and issues such as the EU Central Bank and Greek crisis

2015-07-15

FBI - Encryption is Great as Long as it Still Lets Us In

Too-tough-to-crack encryption poses a threat to national security.

2015-07-10

Espionage Lessons from the OPM Hack

Three lessons emerge that might give us hope for a secure future.

2015-07-07

UK’s Home Secretary named Internet Villain

Crowned 'Internet Villain' of the year by the Internet Service Providers Association, one of the UK's biggest Internet lobbying groups.

2015-07-10

Cyber Security in China: New Challenges to the West

China’s Internet & telecoms giants are very successful but the Chinese IT market is getting more challenging for western businesses.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

2015-07-07

Trade Groups Protest US Block on Digital Imports

Internet Restrictions: US International Trade Commission can block digital goods, in additional to physical ones, from being imported.

2015-07-06

Cyber Command: A War That Started Long Ago

Israel's decision to establish a cyber command is symbolic. The IDF has been active in cyber wars for years.

2015-07-07

Legality of Target Acquisition: The U.S. Needs a Drone Board

Judge With a Finger on the Trigger? Target acquisition In the lethal drone program is about to become the subject of legal due process.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.