GOVERNMENT > National


« Back to News

2020-03-16

Iran's Cutting Edge Cyberwar Capabilities

Iran has the skills to conduct attacks against its enemies across numerous sectors, including energy, financial services & critical infrastructure.

2020-03-13

UK Government: Mobile Devices Lost & Stolen

British government employees lost 1,474 devices in 12 months, 347 were reported stolen and 183 were either lost or stolen. Many were unencrypted.

2020-03-06

US Increases Pressure To Stop Huawei 5G In Britain

The US does not think the UK’s decision to allow Huawei to buy 5G technology is final and is keeping up the pressure to change its mind.

2020-02-26

Cyber Security Warnings For US 2020 Election

Security experts warn that government agencies are under attack and that hackers are very likely to focus on the forthcoming US Presidential election.

2020-02-28

Singapore To Spend $1B On Cyber Security

Singapore has budgeted to allocate $1 billion over the next three years to protect its cititizens' data and strengthen national cyber security.

2020-02-26

Canada's Government Breaks The Rules

Numerous federal departments and national agencies have been mishandling the personal data of thousands of Canadian citizens.

2020-02-18

Top Australian Spy Condemns Britain's Huawei Decision

The outgoing Head of the Australian Signals Directorate spy agency says that Britain is mistaken to think it can trust Huawei's 5G network.

2020-02-17

Fake News And The 2020 Presidential Election

American voters report a high level of concern about how secure the 2020 presidential election will be and worry about the perils of disinformation.

2020-02-12

Is Widespread Suspicion Of Huawei Justified?

British MPs are opposing the decision to allow untrusted Huawei access to 5G infrastructure, whilst China insists it has nothing to do with them.

2020-02-11

US Government Cyber Security Still Needs Work

The US State Department has consistently failed to secure its IT systems from cyber attacks, reflecting a general mismanagement of resources.

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Sherweb

Sherweb

Over the years, SherWeb has become one of the most renowned and respected worldwide hosted services leaders in the cloud industry.

Security IT Summit

Security IT Summit

The Security IT Summit is a unique one-day event which allows senior IT & Cyber security professionals to meet with innovative and competitive suppliers to the industry.

Twistlock

Twistlock

Twistlock provides end-to-end container security. From vulnerability management to runtime protection, this is enterprise security with DevOps agility.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

CloudSecOps

CloudSecOps

CloudSecOps provide cutting edge security professional services in web applications, networks, and cloud specializing in modern infrastructures on AWS.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.