GOVERNMENT > National


« Back to News

2016-04-04

New Study Ranks Nations On Cyber Vulnerability

Data-mining experts have ranked the vulnerability of forty-four nations to cyberattacks and the results may surprise you.

2016-04-01

Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’

General Michael Hayden turned the CIA into a militarised force. He now thinks the obsession with counter-terrorism obscures more serious threats.

2016-03-29

Clinton Emails Suggest Google's Assistance In Undermining Assad

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime.

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-03-23

China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States.

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-14

China Cracks Down On Top Hong Kong Newspaper

Firewall Censorship: Social media accounts of the South China Morning Post suspended and the media group's news websites blocked in China.

2016-03-04

Pentagon Starts Aggressive Cyberwar Against ISIS

The US military is ramping up its offensive cyberattacks on the Islamic militant group, targeting the group’s abilities to use social media.

2016-03-04

UK Government Goes Ahead With Revised Surveillance Bill

Its Back: The Home Office was made to revise the draft bill after concerns by legislators that it was too vague and did not protect privacy enough.

2016-03-02

Great Wall: China Bans Foreign Online Publishing

Firewall: China is to ban foreign firms from "online publishing" as the country increasingly seeks to minimise Western influence.

2016-02-26

Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

Surprise: The US has engaged in "offensive cyber operations" against Russia.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LSEC

LSEC

LSEC is a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe.

Myra Security

Myra Security

The fully automated Myra DDoS Protection reliably protects web applications, websites, DNS servers, and IT infrastructures.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.