GOVERNMENT > National


« Back to News

2020-09-21

Foreign Influence In The American Election Of 2020 Is Declining

A long-serving CIA official and distinguished expert on cybersecurity says that there will be less interference in the 2020 election than 2016.

2020-09-17

Cyber Security Should Be A Mandatory Requirement

With increasing threats and fewer opportunities to fail, governments must rise to the challenge to protect national security and economic prosperity.

2020-09-15

Nation-State Hackers Are Infiltrating The 2020 Election

Microsoft has evidence that nation-state cyber-attacks are targeting individuals & organisations involved in the impending Presidential election.

2020-09-09

British Cyber Security Market 2020

Analysis of the UK cyber security industry, including its size, employment & revenue, reveals that business is booming across all sectors.

2020-09-04

Cyber Attacks On Norway’s Parliament

Berlin, Westminster, Strasbourg. Now Norway's Oslo parliament has been hit by a significant cyberattack with MPs' email accounts hacked.

2020-09-07

How Did Belarus Shut Down The Internet ?

The Belarus government has been using equipment manufactured by a US company to block its citizens' access to thousands of websites.

2020-09-08

NCSC Chief Reflects On Cyber Crime, China, Russia & Technology

Ciaran Martin, the CEO of the UK’s National Cyber Security Centre, will step down after seven years on the job and has chosen to speak out.

2020-09-08

The US Steps Up Its Cyberwar Capability

Cyberspace is a warfighting domain and the US military is waking up to the need to defend the country and its allies from foreign cyber threats.

2020-09-02

Estonia’s Crucial Role In Tackling Growing Cyber Threats

Estonia holds the presidency of the UN Security Council just as Coronavirus exposes the risks of failing to protect critical digital infrastructure.

2020-09-02

British SMEs Are Suffering A Surge In Cyber Attacks

Since the beginning of Covid-19 there are 65,000 cyber security attacks on British SMEs every day and around 4,500 of these are successful.

2020-09-01

The Canadian Government Comes Under Attack

Hackers used thousands of stolen usernames and passwords to fraudulently access government services in three separate major breaches.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.