GOVERNMENT > National


« Back to News

2018-11-02

Election Hacking Threatens US Mid-Terms

Modern election security means coming to grips with a daunting reality: US infrastructure is too fragmented, outdated & vulnerable to be secured.

2018-11-02

Realistic Fake Videos Threaten Democracy

A well-timed and thoughtfully scripted deep fake could tip an election or exacerbate political divisions in a society.

2018-11-07

Finland Is Worried About Russian Cyberwar Techniques

Falling in the shadow of its giant neighbour means that Finland is being  inevitably drawn into the world of Russian hybrid warfare.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

2018-10-31

Russia And US Offer Competing Visions Of Cyber Normality

The United States is trying to get Russia, China, and others 'on the record' on how international law applies online.

2018-10-22

35 Million 2018 US Voter Records For Sale

Current voter registration data found for sale on a hacking forum, includes full name, phone numbers, physical addresses & voting history.

2018-10-23

China Is 'biggest state sponsor of Cyber-Attacks on the West'

China, not Russia, has become the biggest state sponsor of cyber-attacks in its bid to steal commercial secrets, according to Crowdstrike.

2018-10-18

British National Cyber-Centre Thwarts Hostile Hackers

The NCSC say it is defeating about 10 attacks every week, mostly carried out by state-sponsored hackers employed by hostile nations.

2018-10-16

US And France To Permit Fully Driverless Cars On Public Roads

The USA and France are developing safety standards and regulations to allow fully driverless vehicles on public roads.

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.