GOVERNMENT > National


« Back to News

2021-02-17

A Successful Solar Winds Investigation

The Solar Winds hack was a systemic failure by the US security establishment. Now is the time for a quiet, forensic investigation. By Ronald Marks

2021-02-16

Myanmar’s Cyber Security Bill

Myanmar’s military coup leaders have produced a draconian cyber security bill that gives the government sweeping powers over the Internet.

2021-02-16

British Parliament Wakes Up To Huawei

British MPs warn the government to be proactive with legislation on emerging technologies and learn from its flip-flop over Huawei's 5G system.

2021-02-10

Russian Government Warns Business Of US Cyber Attack

The Russian government has issued a cyber security warning to organisations at risk of US reprisals for the devastating SolarWinds attacks.

2021-02-08

Myanmar’s New Military Rulers Block Facebook

For many of the population social media is their only access to the Internet and Facebook has become a rallying point against the military coup.

2021-02-02

Google Threatens To Leave Australia

Australia is introducing legislation to require Google, Facebook and other social media companies pay for their local news content.

2021-01-28

NSA Appoints New Cyber Director

The US National Security Agency has a new leader for its Cybersecurity Directorate, someone most recently their top representative in Britain.

2021-01-27

Biden Selects His Cyber Team

President Joe Biden is hiring a group of national security veterans with deep cyber expertise to recover from one of the biggest hacks in history.

2021-01-20

Evidence Emerging About Cyber Attacks On US Government

Malicious Code: Kaspersky have found evidence indicating that Russia was behind the cyber attacks on the US Treasury and other agencies.

2021-01-18

Social Media Is Being Used To Turn Truth Upside Down

Despite Donald Trump being canceled on Twitter and Facebook and the Parler platform kicked offline, the flood of fake news keeps on coming.

Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

ESTsecurity

ESTsecurity

ESTsecurity provides intelligent security threat management solutions to make a safer world.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

XM Cyber

XM Cyber

XM Cyber provides the first fully automated breach and attack simulation (BAS) platform to continuously expose attack vectors.

Jolocom

Jolocom

Jolocom builds decentralized software solutions that enable people, organizations, and machines to own and control their identity information.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.