GOVERNMENT > National


« Back to News

2015-04-02

China Admits to Having Cyber Warfare Units

China has finally admitted that it has cyber warfare units and plenty of hackers attached with them.

2015-04-01

Israel Girds Itself for Cyber Warfare

Israel is preparing for escalating cyberwar.

2015-04-01

Iran has Built a Cyber Army Faster than Imagined.

Iran has increased its cybersecurity spending 12-fold.

2015-03-30

A Simple Guide to GCHQ's Hacking Powers

New documents released by the UK government and privacy advocates give a glimpse of how GCHQ operates.

2015-03-30

Facebook Data Row Reaches Top Euro Court

Max Schrems has long campaigned against Facebook's data practices. Now he has a day in Court.

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-26

Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common.

2015-03-24

Europe’s Data Privacy Laws Annoy US Tech Companies

Europe is closer to approving new data-privacy legislation that threatens to raise tensions with US technology firms.

2015-03-25

Hackers Extort S. Korea for Data on Nuclear Plants

A hacker who posted inside information on South Korea’s nuclear power plants has made fresh threats.

2015-03-19

After the Arab Spring, Surveillance in Egypt Intensifies

Egyptian information activists say that government surveillance is getting worse.

2015-03-18

Netherlands Court says Data retention a breach of privacy

Judges in The Hague says country’s regime for retaining telephone and Internet users helps to solve crime but is too intrusive.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CyberDefenses

CyberDefenses

CyberDefenses services combine best-in-class cybersecurity oversight, managed services and training to help our clients truly address their cybersecurity challenges.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.