INTELLIGENCE > Hot Spots > China


« Back to News

2021-08-31

China Has A 3-Year Plan For Cyber Security

China is increasing efforts to protect national cyber security and will strengthen IT infrastructure & resilience with new security regulations.

2021-08-09

EU & NATO Agree To Confront The Chinese Cyber Threat

This new alliance will share intelligence on cyber threats and collaborate on network defenses and cooperative security, but not on retaliation.

2021-08-05

China’s National Cyber Security Powerhouse Strategy

China aims to reduce its reliance on foreign technology and is building a national cyber security centre to produce 2,500 graduates each year.

2021-07-28

Biden Goes After Chinese & Russian Cyber Attackers

After confronting Vladimir Putin on cyber security, President Biden is now turning on China for sponsoring cyber criminal activity around the world.

2021-07-27

Data Privacy Is Key To The Technology Battle With China

The US wants to establish international privacy-protection standards to counter the proliferation of powerful new technologies dominated by China.

2021-06-29

China Is Gaining Technical Supremacy

British spy chiefs warn that leadership in key technologies affecting national security, including AI and Quantum Computing, is moving East.

2021-06-14

Singapore Is The Cyber Attack Hotspot

Leading cyber security firms agree that Singapore is the regional focus for being both the source and the target of growing threat activity.

2021-06-07

Huawei Chooses UAE As Cyber Security Hub

Huawei is helping UAE to establish Smart City and e-governnent infrastructure to create a "globally trusted digital oasis” safe from cyber threats.

2021-05-24

Apple Stores Customer Data In China

Apple stores its Chinese customer data in China, raising concern that this user data is readily accessible to the Chinese government on demand.

2021-04-23

Significant Growth In State-Sponsored Cyber Attacks

It’s increasingly common for cyber attacks to have a state-sponsored element, with countries going online to wage covert warfare on others.

2021-04-13

US Blacklists Seven Chinese Supercomputer Organisations

The firms blacklisted are involved with building supercomputers used by China’s military for modernisation and weapons of mass destruction.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.