GOVERNMENT > National


« Back to News

2018-12-20

Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures

Russian actors launched coordinated cyber-attacks against Ukraine before the seizure of Ukrainian ships in the Kerch Strait.

2018-12-21

British Business Feels Let Down By Government

Government needs to provide more support around cybersecurity issues in 2019, according to the majority of UK IT leaders polled.

2018-12-14

Indian Government To Provide Handbook On Cyber Safety To School Children

The booklet on cyber safety for teenagers tries to address the increased use of smartphones, gadgets, online gaming and social media.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

2018-12-11

MI6 Chief Says Cyber Brings ‘potentially existential challenge’

The fourth industrial revolution is bringing changes that could present a “potentially existential challenge” to liberal democracies.

2018-12-07

Germany Detects New Russian Cyber-Attack

A cyber-attack on the email accounts of German lawmakers, the military and several German embassies by the Russian hacker group Snake.

2018-12-10

Russian Cyber Operations: State-led Organised Crime

Russia is emulating approaches used by cyber-criminals as it blurs the line between state and non-state activities in cyberspace.

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-12-06

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

The crisis triggered by the maritime clash in the Black Sea has brought widespread denunciations of Russian aggression. What happens next?

2018-12-07

Surveillance Spyware Targeted At Journalists In Mexico

Colleagues of a journalist who was shot dead in Mexico last year were the targets of surveillance spyware a day later.

2018-12-04

Russian Hackers Are Using Brexit To Leverage Cyber Attacks

The Fancy Bear hacking team is using Brexit in an effort to trick target institutions across the EU into opening emails and downloading malware.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.