GOVERNMENT > National


« Back to News

2019-01-22

Singapore Upgrades Cybersecurity

Singapore wants a new model of national cyber defence across 11 critical infrastructure sectors, including healthcare, energy, telecoms & transport.

2019-01-21

Shutdown Is Doing Lasting Damage To US National Security

Halting cybersecurity work makes it easier for hostile nation-states to steal Americans’ personal information and corporate intellectual property.

2019-01-21

Zimbabwe Orders Internet Disconnected

The government in Zimbabwe has responded to widespread protests over rising fuel prices by cutting off the nation's wireless & internet services.

2019-01-18

Vietnam Says Facebook Is Acting Illegally

Vietnam has accused Facebook of violating a new cybersecurity law by refusing to remove anti-government content from its site.

2019-01-21

US Vs. China - A Different Kind of Cyberwar

China is engaged in its own form of cyberwarfare, but one that does not readily fit into the West’s long-standing perceptions of war and peace.

2019-01-15

Russians Are Confident Their Homeland Is Secure

International Survey: Russians are confident their country is well prepared to deal with cyber warfare, more so than Britons or Americans.

2019-01-14

US Government Shutdown Is Damaging Cybersecurity

The new Cybersecurity and Infrastructure Agency at US Homeland Security has over half its staff not working and a lots of work has been stopped.

2019-01-09

Cybersecurity In Israel

As a world leader in cybersecurity, Israel takes care over military cybersecurity, but also promotes civilian safety in cyberspace.

2018-12-20

EU Diplomatic Communications 'Targeted by Hackers'

Hackers successfully targeted the European Union's diplomatic communications over a period of several years, The New York Times reports.

2019-01-18

Russia Supported Trump Election Campaign

US Senate says Russia engaged in a coordinated campaign to get Donald Trump elected and US technology companies were central to its strategy.

2019-01-11

UK Launches Long-Awaited Cyber Skills Strategy

A new UK cybersecurity skills strategy designed to reduce industry shortages and a new independent body to help shape the future of the profession.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Whiteswan Identity Security

Whiteswan Identity Security

At Whiteswan, we are committed to protecting the digital landscapes of modern enterprises with adaptive, identity-first security solutions that ensure trust, compliance, and resilience.