GOVERNMENT > National


« Back to News

2015-06-15

Enforcing Magna Carta in the Age of Cyberwarfare

In a modern secular society it's doubtful that many people would be happy with the Archbishop of Canterbury as the prime guardian of Civil Liberties.

2015-06-11

Anderson Report: Review Of UK Anti-Terror Data Laws.

The UK Government will publish a comprehensive review of laws governing bulk interception of communications on mobile phones & the Internet.

2015-06-09

US Stuxnet Attack Against N. Korea Failed

Fail: Stuxnet virus used to attack North Korea's nuclear weapons program five years ago.

2015-06-08

Russia Faked MH17 Images

Russian authorities doctored satellite images it used to try pin the downing of Malaysia Airlines flight MH17 on Ukraine.

2015-06-08

Data Stolen in Hack Attack on German Parliament

Hackers gained access to the Bundestag's internal server, launching an unprecedented attack using Trojan viruses.

2015-06-06

Russia's Greatest Weapon May Be Its Hackers

In hacker jargon, it’s called a “cyber-to-physical effect.” It’s when a hacker reaches out from the virtual world into the real one, often with catastrophic consequences.

2015-06-01

North Korean Hackers 'could kill', Warns Defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and kill people.

2015-05-26

EU’s 'point of no return' if Internet Firms Not Regulated

Amazon, Etsy and Booking.com are all named in a leaked document as having 'undue power' over their markets.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

Snowden Sees Victory – But it’s From a Distance

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

2015-05-19

Russia & China Grow Closer With New Cyber Agreement

Russia and China have vowed not to launch cyber attacks against each other, leaving more time to attack other targets.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Onyxia

Onyxia

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.