FREE TO VIEW


« Back to News

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-03-28

Hamas Upgrades Cyber Espionage Capability

Non-state political groups like Hamas have developed state-like hacking, espionage and surveillance capabilities.

2017-02-21

Italy's Foreign Ministry under Cyber Attack

Italy's foreign ministry was hacked last year, a source close to the department said recently, confirming a report in the Guardian newspaper which also said Russia was suspected of perpetrating the attack.

2017-02-21

Wikipedia's editors cut out the Daily Mail

News that a few dozen Wikipedia editors had decided that the Daily Mail should be “generally prohibited” from being used as a source caused consternation among many in the media.

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

2017-03-27

Data Breaches Attack All Parts Of A Business

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

2017-03-23

Ethics of Drones, Remote Weapons and Robots

Remote and autonomous weapons raise new questions about the boundaries between peace and war, and the nature of future conflicts.

2017-02-21

Robots Will Repair Satellites In Space

The Pentagon is developing robots that can repair satellites in space, more than 20,000 miles above Earth.

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The Britsh government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-03-20

Law to Imprison Journalists for Publishing Leaks

Espionage Act: A new law designed to tackle international espionage could be used to imprison British journalists who obtain leaked material.

2017-02-21

Privacy Groups say FBI Hacking went too Far!

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.