FREE TO VIEW


« Back to News

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-18

Corporate Cybercrime - A Hacker’s Point Of View

It only takes one cleverly worded email for hackers to attack your system from the inside out. Who are they and what do they stand to gain?

2018-10-15

Blockchain As A Service Market To Reach $7 Billion

A recent analysis by Bank of America suggests that blockchain adoption will soon become a multi-billions dollar business.

2018-10-15

AI Hyperdrives Into Outer Space

Future deep space missions are likely to be turbo-charged by Artificial Intelligence on their voyage to comets, moons and the planets.

2018-10-17

Artificial Intelligence - What We Need To Know

The trouble with the term artificial intelligence is the word 'intelligence'. It should not be confused with human sentience.

2018-10-16

US And France To Permit Fully Driverless Cars On Public Roads

The USA and France are developing safety standards and regulations to allow fully driverless vehicles on public roads.

2018-10-16

Stop US School Shootings With AI

A new artificial intelligence security system is aiming to give parents and their kids some additional peace of mind.

2018-10-16

New Google App Fights Censorship

A new Google app has recently been launched aimed at protecting users from state-sponsored censorship.

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

2018-10-16

Pentagon Weapons Systems Vulnerable To Cyber-Attacks

Issues included being able to turn a weapon on or off, affect missile targeting, adjust oxygen levels or manipulate what is seen on control screens.

2018-10-12

Chinese Spy Extradited To Go On Trial

A man the US claims is a Chinese intelligence officer stands accused of trying to steal aviation technology and faces up to 25 years in jail.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.