GOVERNMENT > National


« Back to News

2022-02-09

Britain Aims To Protect Children From Online Pornography

Pornography websites must carry out age checks & require British users to provide credit card or passport details to prove they are over 18.

2022-02-07

Spy Chief Warns US Government Is Classifying Too Much Data

With 18 different and sometimes competing national intelligence agencies, the US is finding that sharing critical information is too difficult.

2022-02-04

Is US Cyber Security Actually Improving?

The US Government is mandating Federal Agencies to move to a 'ZeroTrust' approach to cyber security and implement multilayer user authentication.

2022-02-01

Britain's Cyber Security Strategy Focuses On Resilience

The British government has announced its Cyber Security Strategy to protect vital public services from the growing risk of destructive cyber attacks.

2022-02-01

Ransomware Attack On French Ministry of Justice

It is a mistake to think that national goverenment agencies are more skilled at protecting their critical data than the private sector.

2022-01-31

DDoS Attack Knocks Out Andorra's Internet

Incidents in Andorra & Belarus demonstrate the dangerous vulnerability of small states with unitary telecoms infrastructure to external attack. 

2022-01-29

Canadian Government Ministry Under Attack

Canada's critical infrastructure operators are told to prepare for Russian state-sponsored cyber threats as the foreign ministry comes under attack.

2022-01-24

NATO & Ukraine Agree Deeper Cyber Co-operation

The new agreement gives Ukraine access to NATO’s malware information sharing platform and help to identify Ukrainian cyber security training needs.

2022-01-19

Facebook Hosted A Surge Of Fake News Prior To Capitol Riot

The social media platform's efforts to police misinformation on Facebook groups calling for violent confrontation with US government failed dismally.

2022-01-19

WhisperGate: Russia Responsible For Cyber Attacks On Ukraine

Update: Russia is responsible for malware attacks, defacing websites & leaving numerous infected Ukraine Government computers wiped.

2022-01-11

African Nations Join UN Cyber Crime Initiative

In 2050, one in four of the world’s people will come from sub-Saharan Africa - their current digital challenges need to be addressed. By Karen Allen

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.

Culminate

Culminate

Adopt AI with confidence in your SOC. Utilize human-AI teaming to conduct your investigations with unmatched accuracy and speed.