INTELLIGENCE > Hot Spots > China


« Back to News

2018-07-23

China Dominates Global Investment In AI

Chinese investment and financing in AI technology accounts for 60 percent of the worldwide total, valued in 2017 at $27 billion.

2018-07-11

China Is Spying On Germany

Chinese agents actively networking with German MPs, offering them money and foreign travel in exchange for expertise and 'insider knowledge'.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-06-25

China’s Electronic Surveillance Program Targets Muslims

China has created one of the world’s most sophisticated state surveillance systems to target the predominantly Muslim Uighur ethnic minority.

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-03-09

UK Think Tanks Hacked by Groups in China

Crowdstrike disclose a number of hacks on high profile UK think tanks by China-based groups dating from last year.

2018-02-26

What’s Happening With China’s Fintech?

A unique technology ecosystem: A tech-savvy population, an underdeveloped banking industry, and an initially relaxed regulatory environment.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.