GOVERNMENT > National


« Back to News

2018-05-29

Ecuador Spied On Assange

Trust: Whilst taking refuge in the London Embassy, Assange hacked his hosts network secrets, even although they had him under covert surveillance.

2018-05-25

An Iranian Hacker Confesses

Understanding the hierarchy of Iran's hackers offers insight into how to defend against the prospect of attacks from the Islamic Republic.

2018-05-23

Turkey Using German Spy Software On Opposition Politicians & Activists

The Turkish government has used a German-made spy program to infiltrate the smartphones of the Turkish opposition, despite a ban on its export.

2018-05-22

Hacking The Vote

More than 20 elections scheduled in N. America and Europe over the next two years will provide “fertile ground” for interference.

2018-05-22

Trump Eliminates Top Cybersecurity Post

An expert to streamline & coordinated the various agencies of the US government is not being replaced.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-05-15

First GDPR. Now A New EU Cyber Regulation

The Network & Information Security (NIS) regulation is aimed at creating a base level of security for essential services within the EU.

2018-05-14

Iran Likely To Retaliate With Cyberattacks

The experts at Recorded Future say Iran could swiftly deliver cyberattacks against Western business following US withdrawal from a nuclear treaty.

2018-05-10

Australia Points The Finger At Russia For Cyberattacks

Australian intelligence agencies have identified Russia as the actor behind a series of cyberattacks affecting 400 businesses sine 2017.

2018-05-03

The Next Russian Cyberattacks Will Be More Damaging

Russia is using cyber warfare methods as part of a wider effort to attack the international system, according to the British Prime Minister.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.