GOVERNMENT > National


« Back to News

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-29

Europe Is A Cybercrime Hub

Europe needs businesses to invest in innovative, real-time security capabilities that are robust enough to withstand intense attacks.

2018-05-29

Ecuador Spied On Assange

Trust: Whilst taking refuge in the London Embassy, Assange hacked his hosts network secrets, even although they had him under covert surveillance.

2018-05-25

An Iranian Hacker Confesses

Understanding the hierarchy of Iran's hackers offers insight into how to defend against the prospect of attacks from the Islamic Republic.

2018-05-23

Turkey Using German Spy Software On Opposition Politicians & Activists

The Turkish government has used a German-made spy program to infiltrate the smartphones of the Turkish opposition, despite a ban on its export.

2018-05-22

Hacking The Vote

More than 20 elections scheduled in N. America and Europe over the next two years will provide “fertile ground” for interference.

2018-05-22

Trump Eliminates Top Cybersecurity Post

An expert to streamline & coordinated the various agencies of the US government is not being replaced.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-05-15

First GDPR. Now A New EU Cyber Regulation

The Network & Information Security (NIS) regulation is aimed at creating a base level of security for essential services within the EU.

2018-05-14

Iran Likely To Retaliate With Cyberattacks

The experts at Recorded Future say Iran could swiftly deliver cyberattacks against Western business following US withdrawal from a nuclear treaty.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.