GOVERNMENT > National


« Back to News

2020-01-08

Iran Launches Missile & Cyber Attacks On The US

Beginning with a cyber attack on a US Government website, Iran has followed up with a missile strike against US military bases in Iraq.

2020-01-07

N.Korean Hackers Are Working With European Criminals

There is growing evidence that cyber criminals in Eastern Europe and skilled state-backed spies in North Korea are finding ways to work together.

2020-01-07

Iran's Cyberwar Response To Its General's Killing

Military and cybersecurity analysts are warning that Iran's response could include, among other possibilities, a wave of disruptive cyberattacks.

2020-01-03

Cyber Attacks On Africa Are Soaring

Africa is widely considered the lowest ranked continent for cyber security, with the consequence of attracting a growing range of cyber threats.

2019-12-11

Bitcoin, Murder & Mafia On “Blockchain Island”

An investment project to to mine the controversial cryptocurrency Bitcoin in the EU nation of Malta has been linked to a murder.

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-04

Russia’s AI Mission Is State-Driven

Russia's recognition of the strategic significance of Artificial Intelligence is taking shape and it appears to be focusing on military applications.

2019-12-03

Cyber Security Skills Are On The Limit

The UK's widening cyber skills gap is putting the country's businesses at risk and is proving to be a huge concern for recruitment in the field.

2019-12-03

Police Launch Global Attack On Islamic State

Belgian Police have carried out a cyber attack on a global scale against online propaganda outlets of the Islamic State extremist group.

2019-12-02

British Elections: The Parties Manifestos On Cyber

Broadband Infrastructure. Cyber Crime. The Skills Gap. Data Security. National Defence. Taxing Big Tech. What do the main three parties have to say?

2019-11-29

Australian Parliament Hacked

It took a week to eject the state-sponsored attacker from the Australian Parliament’s IT system. They don't say the extent of the damage.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.