FREE TO VIEW


« Back to News

2018-12-10

Russian Cyber Operations: State-led Organised Crime

Russia is emulating approaches used by cyber-criminals as it blurs the line between state and non-state activities in cyberspace.

2018-12-07

Facebook CEO Zuckerberg Backed Sharing Customer Data

Zuckerberg questioned the business case for giving millions of outside software developers wide access to customer data, then endorsed it.

2018-12-07

Microsoft Tech Support Scam Crackdown - 39 Arrests

Victims were manipulated into providing remote access for "further diagnosis" and typically charged a fee of $150 to $499.

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-12-10

Amazon Gets Into Blockchain

Amazon Go Large: AWS Managed Blockchain allows users you to set up and manage a scalable blockchain network with just a few clicks.

2018-12-06

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

The crisis triggered by the maritime clash in the Black Sea has brought widespread denunciations of Russian aggression. What happens next?

2018-12-07

What Makes Blockchain A New Security Standard?

As efforts to standardize the technology progress, blockchain could become a new security standard for many industries. By Mary Ann Callahan

2018-12-27

Cybersecurity 2019: Predictions You Can’t Ignore

Threat actors are not being deterred; expect more intensified and ever more sophisticated attacks in 2019.

2018-12-06

Fake Facebook Pages Account For 60% Of Social Network Phishing

Kaspersky's anti-phishing tools prevented 3.7m attempts to visit fraudulent social network pages in Q1. The majority were fake Facebook pages.

2018-12-06

Artificial Intelligence Or Deep Learning? What's The Difference?

AI, machine learning, and deep learning often overlap and are easily confused. Here's a concise guide.

2018-12-07

Surveillance Spyware Targeted At Journalists In Mexico

Colleagues of a journalist who was shot dead in Mexico last year were the targets of surveillance spyware a day later.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.