GOVERNMENT > National


« Back to News

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The British government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-02-20

UK Under Attack By Russian & Chinese State Sponsored Hackers

GCHQ say that Britain is being hit by dozens of cyber-attacks a month, including attempts to steal defence and foreign policy secrets.

2017-02-17

Technology, Multilateralism, War and Peace

Wars are no longer only about combatants and tanks, but also about algorithms and bots. Opinion by Anje Kasperesen

2017-02-20

Deterrence & Cyber Attacks On The US Electoral System

Deterring future cyber-meddling in US elections will require convincing adversaries that the response will be painful & their efforts ineffective.

2017-03-20

Does Russia’s Election Meddling Break International Law?

US spies say Russia interfered in the US elections. Cyber warfare experts aren’t sure if that constitutes coercion by one state against another.

2017-02-28

Tech Companies Oppose Trump’s Travel Ban

SpaceX and Tesla are the latest to join the ranks of technology firms officially opposing the migrant ban imposed by the President Trump

2017-03-16

US Changes Policy On International Cyber Regime

US says a UN cybersecurity group should stop working on new rules for online behavior & focus on governments sticking to the ones we have.

2017-02-28

Is It Possible To Neutralise Fake News?

Estonia. Georgia. Ukraine. Czech Republic. Germany. Russian disinformation & fake news is nothing new.

2017-02-15

An Intelligence Crisis In Moscow

Russia is hunting for moles in its security apparatus who might have leaked information about efforts to influence the US presidential election.

2017-02-27

Could Britain Fight A Cyber War with Russia?

Can the UK and its NATO allies compete on the cyber battlefield as much as they do in the conventional spheres of air, land & sea warfare?

2017-03-10

The 4th Industrial Revolution:Can Democracy Survive ?

The general reshaping of industrial and social life might be making traditional mass participatory institutions & political organisations unviable.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.