GOVERNMENT > National


« Back to News

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-06-11

Ex-GCHQ Boss: Nation State Cyber-Attacks Affect Everyone

All organisations are potential targets of nation state attacks, according to former GCHQ Chief, Robert Hannigan, speaking at Infosecurity18.

2018-06-08

Backlash: Facebook's Data-Sharing With Chinese Firms

Facebook draws further criticism from US legislators who are angry to learn about data sharing with suspectedly hostile Chinese firms.

2018-06-07

Chinese & Russian Hackers Target S. Korea Ahead Of US / N. Korea Summit

Whilst S Korea has long been a target of it's northern neighbour, the experts at FireEye say the pace of attacks from elsewhere is intensifying.

2018-06-07

Facebook Gave Chinese Tech Firms Access To User Data

Facebook shares its user data with several Chinese tech firms, including Huawei and Lenovo, both suspected as risks to US national security.

2018-06-06

UK Will Name The Nations Sponsoring Cyber Attacks

Britain will name and shame foreign states that hire hackers to carry out cyber attacks or interfere via the Internet in national elections.

2018-06-04

Malta Under Large Scale Attack

As a well known offshore banking centre for Russian nationals, it is perhaps no surprise that Malta suffers a high number of cyber attacks.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-31

FBI Seizes Control Of Russian Botnet

FBI agents have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, allowing the victims to be identified.

2018-05-30

Denmark Under Attack

Two out of three businesses surveyed have been on the receiving end of cyber-attacks in the last year, with one in eight of those attacks successful.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

Cybersecurity & Infrastructure Security Agency (CISA) - USA

Cybersecurity & Infrastructure Security Agency (CISA) - USA

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.