INTELLIGENCE > Hot Spots > China


« Back to News

2021-04-02

China & India In Cyber Conflict

Neighbours: Cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-11

President Biden’s Cyber Dilemma

President Biden is grappling with two major cyber incidents in his first 50 days in office, underlining the challenge the US faces from foreign actors.

2021-03-09

Microsoft Email Software Breached

Hackers have found vulnerabilities in different versions of Microsoft software which allows them to remotely access corpotate email inboxes.

2020-12-01

Britain Bans Huawei 5G

The UK government will ban new Huawei technology from the national telecoms network from September of 2021 - much earlier expected.

2020-11-27

A ‘FunnyDream’ From China

Some senior corporate executives have been having nightmares about being hacked on their business trips in Asia. They're not just dreaming.

2020-09-03

Has China Become The Greatest Cyber Power?

The aggressive use of cyber operations and IP theft to achieve political and national aims has set China apart from almost every other nation.

2020-09-08

NCSC Chief Reflects On Cyber Crime, China, Russia & Technology

Ciaran Martin, the CEO of the UK’s National Cyber Security Centre, will step down after seven years on the job and has chosen to speak out.

2020-08-31

US - China Conflict Over Social Media

There is now more tension between the US and China as the US government focuses on the Chinese online services industry.

2020-08-18

Chinese Hackers Aim To Plunder Taiwan's Semiconductor Industry

Advanced semiconductor chips are vital for the IoT and 5G telecoms. Making them is Taiwan's strategic industry and China wants their secrets.

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.