GOVERNMENT > National


« Back to News

2019-06-04

US Campaigners Get Trained About Cyber Threats

Have the US political parties learned from the events of 2016? This is a critical question as the 2020 Presidential election draws nearer.

2019-05-17

G7 To Simulate Cross-Border Cyber Attack

Leading Western industrial powers will for the first time jointly simulate a major cross-border cybersecurity attack on the financial sector.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-17

Israel Finds It Has Numerous Cyber Vulnerabilities

Israels's National Cyber Directorate thinks that the national cyber agencies & infrastructure companies need  a clear legal framework.

2019-05-13

Brexit Threatens Cybercrime Detection

British police say that speedy European evidence-sharing about cybercrime may be endangered by a no-deal Brexit.

2019-05-13

Has President Trump Lost The Cyber Plot?

The US Navy could be at risk of investing in conventional 'kinetic' force where it already predominates, at the expense of cyber weapons.

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-02

Russia Plans To Monitor Internet Access

The 'sovereign Internet law” isolates domestic online traffic by requiring it pass through servers run by the national Internet regulation agency.

2019-05-01

GCHQ Chief Wants A Big Effort To Improve British Cybersecurity

Spy chief Jeremy Fleming says that government, academia and industry in the UK must increase the level of cybersecurity collaboration.

2019-04-29

France’s National Cybersecurity Policy: Both Defend & Attack

In a major policy statement the French government says it will use its cyber arms as offensive weapons, as well as to respond an attack.

2019-04-25

Huawei To Be Given 5G Contracts In The UK

The British government looks ready to grant the Chinese tech giant eligible status to supply all “non-core” infrastructure related to the network.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.