GOVERNMENT > National


« Back to News

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-19

US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its critical infrastructure.

2018-03-19

Millions Of Facebook Profiles Were ‘Harvested’ In US Election Breach

50m Facebook profiles were collected and analysed for the Trump campaign by Cambridge Analytica in a huge data breach.

2018-03-19

The Growing Threat Of Russian Cyber Reprisals On Britain

UK Banks, energy & water companies are on maximum alert over the threat of a serious cyber attack from Russia following an assassination attempt.

2018-03-16

North Korea's Cyber Soldiers Are Concealed Abroad

Defectors from N Korea reveal the nation's hackers are in fact mostly based outside the country to give the regime enhanced deniability.

2018-03-15

Russia Warns UK Against Cyber Retaliation

Britain could launch a cyber attack in retaliation for the alleged use of a nerve agent in an assassination attempt on Russians in the UK.

2018-03-13

Singapore Sets Up A Cybersecurity Start-Up Hub

Singapore is setting up its first cybersecurity start-up incubation hub, as the nation strives to carve out a role in the digital economy.

2018-03-13

The Pentagon Puts Google’s AI To Use

Open source AI technology originally developed by Google is finding its way into big budget US military programs.

2018-03-13

Further Cyberattacks On German Government Networks

While blaming Russian APT28 hackers Germany's security services have allowed the attack to continue in order to gather more information.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Federal Office For Information Security (BSI) - Germany

Federal Office For Information Security (BSI) - Germany

The BSI (Bundesamt fur Sicherheit in der Informationstechnik) is the federal cyber security agency and the chief architect of secure digitalisation in Germany.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.