GOVERNMENT > National


« Back to News

2015-07-10

Cyber Security in China: New Challenges to the West

China’s Internet & telecoms giants are very successful but the Chinese IT market is getting more challenging for western businesses.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

2015-07-07

Trade Groups Protest US Block on Digital Imports

Internet Restrictions: US International Trade Commission can block digital goods, in additional to physical ones, from being imported.

2015-07-06

Cyber Command: A War That Started Long Ago

Israel's decision to establish a cyber command is symbolic. The IDF has been active in cyber wars for years.

2015-07-07

Legality of Target Acquisition: The U.S. Needs a Drone Board

Judge With a Finger on the Trigger? Target acquisition In the lethal drone program is about to become the subject of legal due process.

2015-07-06

China tightens grip over the Internet

US trade groups are worried that China's security policies could stifle their business.

2015-07-06

Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using public Wi-Fi to connect to the Internet will be required to register their mobile devices.

2015-07-03

World Faces 'bloodless' Cyber War says India’s PM

"A Digital India where cyber security becomes an integral part of national security"

2015-07-02

Merkel Bugged While Pondering Greece Crisis

Wikileaks release evidence that Chancellor Merkel's telephone calls are still being tapped.

2015-06-30

Cyberwars Between Nations Are Difficult to Prove

The OPM attack is merely the latest of a number of high-profile hacking attacks and attributing blame is a challenge.

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.