INTELLIGENCE > > Europe


« Back to News

2020-12-29

The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit trade deal, but what does this mean for British cyber security?

2020-12-01

Britain Bans Huawei 5G

The UK government will ban new Huawei technology from the national telecoms network from September of 2021 - much earlier expected.

2020-11-05

British Military Gets A Defensive Cyber Security Platform

Researchers have shared expertise to enable the cyber security platform to make predictions about the likely next steps of an evolving attack.

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-20

Russia Accused Of Cyber Attack On Norway

Norway blames Russian agents for a cyber attack on its Parliament, saying the hacking of MPs email is a blow against democratic institutions.

2020-07-22

The British Government 'badly underestimated' Russian Political Interference

A critical official Parliamentary Report says that the UK government made no effort to investigate Russian interference in its democratic processes.

2020-07-14

Huawei 5G Ordered Out Of UK Networks

Mobile operators will have to remove all the Chinese technology company's 5G equipment from their UK networks by 2027.

2020-07-14

A Cyber Attack On The UK From China Can Now Be Expected

Australia, India, Taiwan, Hong Kong have all been the target of state-sponsored cyber attacks from China. With tensions growing, Britain is next.

2020-06-15

The British Army Has A New Cyberwar Regiment

The unit will provide ‘digital armour’ to give commanders and their soldiers the ability to operate with secure communications systems.

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-06-02

German Critical Infrastructure At Risk Of Russian Hacking

Russian hackers have a special intrusion technique to target the computer  systems used by industrial firms to manage critical infrastructure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

SessionGuardian

SessionGuardian

SessionGuardian (previously SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).