GOVERNMENT > National


« Back to News

2016-01-20

EU General Data Protection: A Milestone Of The Digital Age

The recently agreed-upon EU General Data Protection Regulation (GDPR) might be the most important piece of legislation in the history of the EU.

2016-01-19

Mandatory Requirement on Business To Disclose Cyber Attacks

Companies that do not “come clean” about being the victims of cyber crime should face prosecution, says British MP.

2016-01-21

Can the Warfare Concept Of Manoeuver Be Usefully Applied In Cyber Operations?

Although the cyber domain has unique characteristics, the timeless principles of manoeuver warfare still apply. Opinion by David Gioe

2016-01-13

Indian ‘Black Hats' Hack Pakistani Websites

A group of Indian hackers hacked and vandalized seven Pakistani websites including that of Pakistani Lawyers' Bar Council.

2016-01-12

USA 2016: How Will Snowden Vote?

Edward Snowden is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. Democrat or Republican?

2016-01-04

China Passes Controversial Counter-terrorism Law

China passes anti-terrorism laws that requires technology firms to help decrypt information and permits the military to pursue terrorists overseas.

2016-01-09

North Korea's 'Paranoid' Computer Operating System

North Korea’s homegrown computer operating system reportedly mirrors its political one - marked by a high degree of paranoia.

2016-01-08

Yahoo Will Notify Users of 'state-sponsored' Hacks

Yahoo’s announcement follows a similar move by Facebook, as Internet companies respond to ‘more advanced & dangerous’ attacks.

2016-01-04

Cyberwar: Islamic State, Russia & China Hold The Advantage

Can democracies compete 'where powers can be fighting each other with one hand and shaking hands with the other?'

2016-01-04

Islamic State Aims to Launch Cyberattacks on US

The Islamic State is seeking the ability to launch cyberattacks against US government and civilian targets.

2016-01-04

Apple Opens Fire In Encryption Battle

On one side, Silicon Valley, arguing that weakening encryption puts privacy at risk. On the other, security services, police and governments.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

ITConnexion

ITConnexion

From cloud migration to ransomware protection, our managed IT services can be customised to address the most prevalent IT issues for your business.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.