GOVERNMENT > National


« Back to News

2015-09-08

US Intelligence Keys in on the Russian ‘Troll Army’ Manipulating Social Media

False Open Sources: US Intelligence thinks that Russia is skilful at using social media to generate propaganda.

2015-09-08

Hackers Target Saudi Government Websites

Over 24 Saudi government websites have been hacked despite the fact that the hackers gave advance warning.

2015-09-09

Pentagon Increasing Drone Flights By 50%

The Pentagon is planning to increase the number of drone flights by 50% to meet the US demands for surveillance & air strikes.

2015-09-08

Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat

Anonymous Malaysia threaten Internet 'Warfare'

2015-09-08

Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

2015-09-11

Assange Advised Snowden To Go to Russia

It was WikiLeaks founder Julian Assange who advised NSA whistleblower Edward Snowden to go to Russia.

2015-08-28

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.

2015-08-26

Hacker Cracks Satellite Communications Network

The Globalstar satellite network uplink was hacked using a simple software-defined radio system & parts costing less than $1,000

2015-08-25

Legal Issues Of Cyber War Are Big & Complex

What does it it take to trigger self-defense in cyberspace, and what does it mean for a nation-state to have 'effective control' of a hacker?

2015-08-25

Cyber Attacks on the Power Grid

The protection of critical infrastructure like a power grid is an essential part of the cyber strategy of any Government.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

MXC Security

MXC Security

MXC designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

GrabDefence

GrabDefence

GrabDefence enables digital businesses to thrive by safeguarding their ecosystem against fraud risk, digital identity threats and compliance challenges.