GOVERNMENT > National


« Back to News

2019-04-03

British Cyber Security Strategy Is ‘Chaotic’

With cyber security responsibilities spread across six different departments, the UK government is coming in for biting criticism from its opponents.

2019-04-02

New Zealand Reconsiders Mass Surveillance

After the mass murders in Christchurch, NZ politicians are talking about resuming a wide ranging mass surveillance program.

2019-04-01

Company Directors Must Become Cyber Aware

The UK is home to world leading businesses but the threat of cyber-attacks is always present. Business leaders must do more to reduce their risk.

2019-04-01

Ukraine Battles To Combat Election Hackers

The outcome of elections in Ukraine could hang in the balance if previous attacks by Russian hackers are successfully repeated.

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

2019-03-25

The US Navy Is Leaking Secrets

The US Navy is aware of cyber-attacks by foreign hackers but has failed to effectively respond or to warn its defense contractors of the danger.

2019-03-25

US Army Wants To Convert Tanks Into Autonomous Weapons

The US Army plan to build AI - directed tanks is'“another significant step towards lethal autonomous weapons.”

2019-03-17

China Gives Police New Powers To Spy On Foreign Firms

Security experts have warned foreign firms operating in China that new laws may give the authorities more power to spy on and censor them.

2019-03-01

US Under Attack By Chinese & Iranian Hackers

Geopolitics pay out in cyberspace as attacks from Iran and China reflect disagreements between nation states on sanctions and trade.

2019-03-13

Cyber-Spies For Hire

Governments across the world are gearing up for the next domain of warfare by recruiting the experienced soldiers of the future, cyber-spies.

2019-03-13

Top Six Cyber Secure Countries

Many governments are putting resources into enhancing their cyber security as the frequency of attacks rises. Six nations stand out.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.