GOVERNMENT > National


« Back to News

2015-12-06

Cyber Warfare Is Integral To Modern International Politics

Cyber-operations are being used for information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine.

2015-12-04

N. Korea Employs Grads for Cyber Warfare

North Korea is reportedly recruiting graduates from Pyongyang University of Science & Technology for cyber warfare.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-11-24

UK Crime Rate Rises Sharply as Cybercrime is Included

It is estimated there were 2.5m “computer misuse” incidents last year, where a victim’s computer is infected by a virus.

2015-11-25

De-escalation Is The Answer To Growing Cyber Tension

Failure to follow through on the US-China cyber non-agression agreement could be the first step in history toward an inevitable world cyberwar.

2015-11-11

Who Is In Charge if a Massive Cyber Attack Strikes the U.S?

Large scale cyber attacks on infrastructure may be unlikely, but if it happens, the chain of command is far from clear.

2015-11-13

EU votes Snowden Human Rights Asylum

MEPs last week voted Edward Snowden should be granted asylum in Europe on the grounds that he is a “defender of human rights.”

2015-11-12

MI5 Relies on Hacking

The British spy agency says it has “relied” on hacking techniques in “the overwhelming majority of high priority investigations" over the past year.

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-11-11

Conditional Clearance For Hackers To Test Automotive & Healthcare Security

U.S. Researchers will be able to look for flaws in software running on cars and medical devices without fearing legal action.

2015-11-11

Julian Assange: Google is Hillary Clinton's 'Secret Weapon'

A Google offshoot is building the infrastructure for personalized, data-driven election campaigning in the 2016 U.S Presidential race.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.

Securitum

Securitum

Securitum is a leading penetration testing company in central and eastern Europe.