INTELLIGENCE > Hot Spots > China


« Back to News

2021-05-24

Apple Stores Customer Data In China

Apple stores its Chinese customer data in China, raising concern that this user data is readily accessible to the Chinese government on demand.

2021-04-23

Significant Growth In State-Sponsored Cyber Attacks

It’s increasingly common for cyber attacks to have a state-sponsored element, with countries going online to wage covert warfare on others.

2021-04-13

US Blacklists Seven Chinese Supercomputer Organisations

The firms blacklisted are involved with building supercomputers used by China’s military for modernisation and weapons of mass destruction.

2021-04-02

China & India In Cyber Conflict

Neighbours: Cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-11

President Biden’s Cyber Dilemma

President Biden is grappling with two major cyber incidents in his first 50 days in office, underlining the challenge the US faces from foreign actors.

2021-03-09

Microsoft Email Software Breached

Hackers have found vulnerabilities in different versions of Microsoft software which allows them to remotely access corpotate email inboxes.

2020-12-01

Britain Bans Huawei 5G

The UK government will ban new Huawei technology from the national telecoms network from September of 2021 - much earlier expected.

2020-11-27

A ‘FunnyDream’ From China

Some senior corporate executives have been having nightmares about being hacked on their business trips in Asia. They're not just dreaming.

2020-09-03

Has China Become The Greatest Cyber Power?

The aggressive use of cyber operations and IP theft to achieve political and national aims has set China apart from almost every other nation.

2020-09-08

NCSC Chief Reflects On Cyber Crime, China, Russia & Technology

Ciaran Martin, the CEO of the UK’s National Cyber Security Centre, will step down after seven years on the job and has chosen to speak out.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.

Sesame Technologies

Sesame Technologies

Sesame Technologies provides advanced cybersecurity services to protect businesses from digital threats.

Triam Security

Triam Security

Triam Security are on a mission to make software supply chain security effortless, effective, and invisible - so developers can move fast without leaving security behind.