GOVERNMENT > National


« Back to News

2018-11-12

The UK Will Be Hit By A Category One Cyber-Attack

Britain has not yet faced what would be considered a ‘category one’ cyber-attack, but there is little doubt that it will happen.

2018-11-12

Edward Snowden Issues Surveillance Warning To Israelis

Speaking from Moscow, Edward Snowden has urged an Israeli audience to be on guard against heavy-handed government & private surveillance.

2018-11-09

Microsoft Wants To Work with Trump & Congress On Cybersecurity

Bipartisan: Despite a newly divided US Congress, Microsoft is looking for ways to create a global force-field against cybersecurity threats.

2018-11-08

Iran Admits To Being Hit By Cyber Attack

Iran’s strategic infrastructure networks have reportedly come under an extensive and powerful cyber-attack. Who would do that?.

2018-11-12

How Did Iran Find CIA Spies? They Googled It!

A covert channel used for communicating with CIA sources was exposed and infiltrated by Iranian intelligence in 2009.

2018-11-12

China Has “taken the gloves off” In Hacking Attacks

China has upped its hacking game, improving operational security and penetration skills and learning from Russian expertise.

2018-11-07

Why Has The US Not Been Hit With A Devastating Cyber Attack?

Security experts have been warning about a devastating cyber-attack for over a decade. Here are a few theories why it hasn’t occurred… yet.

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

2018-11-02

The Pentagon Prepares A Cyber-Attack On Russia

The defense establishment has agreed a plan for a major cyber-attack that the US could unleash if Russia interferes with the 2018 midterm election.

2018-11-02

Election Hacking Threatens US Mid-Terms

Modern election security means coming to grips with a daunting reality: US infrastructure is too fragmented, outdated & vulnerable to be secured.

2018-11-02

Realistic Fake Videos Threaten Democracy

A well-timed and thoughtfully scripted deep fake could tip an election or exacerbate political divisions in a society.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.