INTELLIGENCE > Hot Spots > China


« Back to News

2021-05-24

Apple Stores Customer Data In China

Apple stores its Chinese customer data in China, raising concern that this user data is readily accessible to the Chinese government on demand.

2021-04-23

Significant Growth In State-Sponsored Cyber Attacks

It’s increasingly common for cyber attacks to have a state-sponsored element, with countries going online to wage covert warfare on others.

2021-04-13

US Blacklists Seven Chinese Supercomputer Organisations

The firms blacklisted are involved with building supercomputers used by China’s military for modernisation and weapons of mass destruction.

2021-04-02

China & India In Cyber Conflict

Neighbours: Cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-11

President Biden’s Cyber Dilemma

President Biden is grappling with two major cyber incidents in his first 50 days in office, underlining the challenge the US faces from foreign actors.

2021-03-09

Microsoft Email Software Breached

Hackers have found vulnerabilities in different versions of Microsoft software which allows them to remotely access corpotate email inboxes.

2020-12-01

Britain Bans Huawei 5G

The UK government will ban new Huawei technology from the national telecoms network from September of 2021 - much earlier expected.

2020-11-27

A ‘FunnyDream’ From China

Some senior corporate executives have been having nightmares about being hacked on their business trips in Asia. They're not just dreaming.

2020-09-03

Has China Become The Greatest Cyber Power?

The aggressive use of cyber operations and IP theft to achieve political and national aims has set China apart from almost every other nation.

2020-09-08

NCSC Chief Reflects On Cyber Crime, China, Russia & Technology

Ciaran Martin, the CEO of the UK’s National Cyber Security Centre, will step down after seven years on the job and has chosen to speak out.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Bonfy.AI

Bonfy.AI

Bonfy.AI prevents incidents in the use and communication of AI and human generated content, providing visibility and proactive risk mitigation of confidentiality, privacy, and compliance.