INTELLIGENCE > Hot Spots > China


« Back to News

2022-10-19

British Spy Chief Warns Of The Threat From China

Britain's GCHQ spy agency chief says Western countries face a "huge threat" from China exploiting tech dominance to control its own citizens.

2022-09-15

The NSA Hacked Huawei Long Ago

The NSA penetrated Huawei's network technology ten years ago and can likely take steps to restrict & prevent any damaging or malicious activity.

2022-09-12

US Tech Firms Forbidden To Manufacture In China

Technology firms that have had US federal funding will be prevented from creating advanced technology factories in China for at least a decade.

2022-09-05

Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet firms including Alibaba, Tencent & Tiktok's owner ByteDance have supplied details of their critical algorithms to China's regulator.

2022-08-08

Taiwan's Government Websites Attacked Just Before Pelosi’s Visit

Sending A Message: Taiwan’s presidential office and other agencies were attacked a few hours before US House Speaker Nancy Pelosi’s arrival.

2022-06-13

Warning: Chinese Cyber Attacks

US security agencies say Chinese state-sponsored threat actors are actively targeting telecoms across a wide range of network service providers.

2022-06-20

The Internet & Freedom Of The Press

The Internet was conceived as a borderless network permitting the free flow of information around the world, but barriers and controls are proliferating.

2022-02-07

News Corp. Journalists Hacked

Chinese hackers are suspected of targeting US and British newspaper journalists in an operation to get access to intelligence from their sources.

2022-01-21

Chinese APT Hackers Used Log4Shell Exploit To Target Academic Institution

Specific steps you can take to ensure your security online & avoid tangling with hacker groups exploiting Log4j security flaws. By Ulrike Niemann

2021-12-01

British Spies Must Adapt to Survive

Britain's secret spy agency will have to become “more open to stay secret” and work with tech companies to counter threats from China and Russia.

2021-10-25

US Cyber Security ‘Kindergarten’ Compared To China

Pentagon CSO Quits: China is heading towards global dominance in AI due to the relatively slow pace of innovation in the United States. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Clearwater Compliance

Clearwater Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

IPV Cyber Tech (IPVTec)

IPV Cyber Tech (IPVTec)

IPV Tec has developed IPVmon, an innovative cloud-based remote-monitoring system for websites and online assets.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).