GOVERNMENT > National


« Back to News

2016-04-29

Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

2016-04-20

The Growing Cyber Threat From Iran

The Islamic Republic of Iran has been steadily developing its cyber offensive capabilities and can now offer a significant threat.

2016-04-12

Ukraine - More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are predicted to come.

2016-04-15

EU Cyber Agency Urges Action To Avoid Crisis

EU countries lack a harmonised framework to respond to the challenges of a large-scale cyber incident, according to security agency Enisa.

2016-04-13

Who’s in Charge When US Suffers A Cyberattack?

Is it NORTHCOM or CYBERCOM? CYBERCOM or the NSA—or both?

2016-04-18

FBI Says A Mysterious Hacking Group Has Had Access To US Government Networks For Years

Hacking group APT6 “have compromised and stolen sensitive information from various government & commercial networks” since 2011.

2016-04-15

Donald Trump Has A Plan for CyberWar

Donald Trump has elaborated some bold and belligerent foreign-policy prescriptions.

2016-04-11

Eight Reasons Why US CEOs Care About New EU Privacy Laws

A major change is on the way in how American companies must handle European citizens’ personal data.

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-06

UK Surveillance Powers Bill Could Force Startups To Build In Backdoors

The UK's proposed new surveillance law enables state agencies to compel even very small startups to build backdoors into their systems.

2016-04-11

CIOs Fear Fines From New EU Data Laws

CIOs are concerned their current security policies put them at risk of serious fines under new European data protection laws.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Everfox

Everfox

Everfox, formerly Forcepoint Federal, has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.