GOVERNMENT > National


« Back to News

2024-10-23

The Flawed Reality Of Artificial Intelligence

There is a growing realisation that AI is just another technology tool, with fundamental flaws of which we must be careful. By Ron Marks

2024-10-21

The UK Needs To Reevaluate Its Cybersecurity Strategy

It is time for the Labour Government to introduce the measures required to safeguard businesses, consumers and their data. By Paul Holland

2024-09-26

US Congress Hit By Cyber Attack

Over 3,000 congressional staffers have had personal information leaked across the Dark Web, in a wide-ranging cyber-attack on the US Capitol.

2024-10-17

2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors

Complex nation state-level activity involving the deployment of intrusive attack vectors, influence campaigns & hybrid threats combining both.

2024-10-09

2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

USA 2024 Elections: Hostile nation pose a serious foreign influence threat, sowing discord & division amongst US citizens.. By Craig Watt 

2024-10-09

Pakistan Joins The Top Tier Of Global Cybersecurity

Pakistan has moved up to join the Top 50 in the ITU Global Cyber Security Index, in major boost to international confidence in the national economy.

2024-10-08

Truth & Lies About US Hacked Voter Data

Malicious actors want to undermine confidence in US election infrastructure. There is no sign the voting system has been compromised, yet.

2024-09-24

International Agreement To Regulate Artificial Intelligence

Britain Signs First International AI Treaty: The signatories commit to collective action to manage AI products & prevent its potential misuse.

2024-09-20

Iran Pays $Mulitmillion Ransom To Protect Its Banks

Iran’s government pushed for the ransom to be paid, fearing instability of the country’s weak financial system, which is under intense pressure.

2024-09-18

Britain Convenes An International Cyber Skills Conference

Protection & Defence: Britain is bringing western countries together to discuss the cyber security threats that face nations around the world.

2024-09-17

2024 US Presidential Election: Nation State Cyber Threats

As the country prepares to vote, hostile nation state actors are seeking to capitalize on US instability to meet pre-defined objectives. By Craig Watt 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.