GOVERNMENT > National


« Back to News

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

2018-10-16

Pentagon Weapons Systems Vulnerable To Cyber-Attacks

Issues included being able to turn a weapon on or off, affect missile targeting, adjust oxygen levels or manipulate what is seen on control screens.

2018-10-12

#PresidentialAlert: A US National Alert Test

The US Federal Emergency Management Agency has sent a wireless emergency test 'presidential alert' message to hundreds of millions of devices.

2018-10-12

Canada Says It Was Targeted By Russian Cyber Attacks

Canada said it too was targeted by Russian cyber-attacks at its Center for Ethics in Sports and at the World Anti-Doping Agency.

2018-10-09

Moscow Challenges The Hague About Alleged Cyber Attack

The Russian Foreign Ministry says the The Netherlands is carrying out a disinformation campaign over an alleged GRU cyber attack.

2018-10-11

Trump Says China Is Meddling In US Elections

Pres.Trump told the UN that China has attempted interference in Midterm elections. Cybersecurity firms & intelligence experts don't agree with that.

2018-10-05

US Offers Its Cyber Secrets To NATO

The US is shortly expected to announce that it will offer its cyber warfare capabilities on NATO's behalf as it acts to counter Russian aggression.

2018-10-05

Russia Stands Accused Of Global Hacking Campaign

Russia is running a hacking campaign to undermine democracies, targeting institutions from sporting bodies to the chemical weapons watchdog.

2018-10-04

Britian Accuses Russian GRU Spy Agency Of International Cyber Attacks

The UK government has directly accused the GRU military intelligence agency of being behind a wave of “reckless and indiscriminate cyber-attacks”

2018-09-28

US Has Devastating Cyber Weapons

The crippling power of US cyber weapons will be deployed more often as authority for their use is moved further down the chain of command.

2018-09-28

UK Builds 2,000-Strong Offensive Cyber Force

Britain's ability to wage war in cyberspace is getting a massive boost with the creation of a new, 2,000-strong offensive cyberspace force.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.