GOVERNMENT > National


« Back to News

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-05-29

The US Can't Stop China Copying Its Cyber Weapons

China is copying the malware that the NSA developed to use against them. Is this preventable or is it an inherent weakness of cyber warfare?

2019-06-04

US Campaigners Get Trained About Cyber Threats

Have the US political parties learned from the events of 2016? This is a critical question as the 2020 Presidential election draws nearer.

2019-05-17

G7 To Simulate Cross-Border Cyber Attack

Leading Western industrial powers will for the first time jointly simulate a major cross-border cybersecurity attack on the financial sector.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-17

Israel Finds It Has Numerous Cyber Vulnerabilities

Israels's National Cyber Directorate thinks that the national cyber agencies & infrastructure companies need  a clear legal framework.

2019-05-13

Brexit Threatens Cybercrime Detection

British police say that speedy European evidence-sharing about cybercrime may be endangered by a no-deal Brexit.

2019-05-13

Has President Trump Lost The Cyber Plot?

The US Navy could be at risk of investing in conventional 'kinetic' force where it already predominates, at the expense of cyber weapons.

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-02

Russia Plans To Monitor Internet Access

The 'sovereign Internet law” isolates domestic online traffic by requiring it pass through servers run by the national Internet regulation agency.

2019-05-01

GCHQ Chief Wants A Big Effort To Improve British Cybersecurity

Spy chief Jeremy Fleming says that government, academia and industry in the UK must increase the level of cybersecurity collaboration.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Quadrant Information Security

Quadrant Information Security

Quadrant Information Security is a consulting firm committed to supporting organizations in all vertical markets and protecting their sensitive data.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.