GOVERNMENT > National


« Back to News

2020-09-29

BT Dumps Huawei For Nokia 5G

Nokia has signed a 5G deal with British Telecom and is set to become a major beneficiary of Huawei being blocked from the UK's 5G networks.

2020-09-29

Chinese Hackers Spying On US Government Agencies

Chinese hackers are exploiting known software flaws in commercial technologies and open-source tools to target US government and businesses.

2020-09-29

Social Media Campaigns Designed To Disrupt US Election

Facebook and Twitter say that a Kremlin-backed organisation that interfered in the 2016 election is once again targeting American voters.

2020-10-07

Foreign Hackers Threaten US Election Security

Foreign actors may create or alter websites and create fake news that discredits the US electoral process and undermines voters' confidence.

2020-10-07

Australia Wants Google & Facebook To Pay For News

As Big Tech resists calls for greater regulation, Australia will compel Google and Facebook to pay for news content provided by media publishers.

2020-10-09

Iranian Government Hackers Spy On Dissidents

An Iranian hacker group has spied on Iran’s government political opponents for years by exploiting stolen 2 Factor Authentication codes.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-24

Government, Cyber Attacks, Terrorism & Piracy

Cyber-attacks do not require large financing for weapons or recruits, but the effects can be global, immediate and devastating. By Alfred Rolington

2020-09-23

New Iranian Ransomware Groups Detected

Two new Iranian hacking groups using ransomware have recently been identified. One is a highly professional team, the other less so.

2020-09-22

TikTok’s Indian Rival Ready For Testing

India has banned TikTok and other Chinese social media Apps. Now, YouTube will test a beta version of its new short-form mobile video rival.

2020-09-22

Exaggerating Cyber Threats Undermines Policy Making

Ex-NCSC chief says that predictions of catastrophic consequences for governments & business of a major cyber attack are counter-productive.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Security Innovation Network (SINET)

Security Innovation Network (SINET)

SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).