FREE TO VIEW


« Back to News

2017-03-22

Handbook Of Russian Information Warfare

NATO just published a new guide to Russian capabilities and intentions for combined information & cyber warfare.

2017-03-24

Snowden Says Report Proves He’s Not A Spy

Edward Snowden says reports that Russia might deport him to the US as a “gift” to Donald Trump vindicate him of charges that he is a spy.

2017-02-21

Global Banks Hit by Watering Hole Blitz

Over 100 organisations worldwide have been hit by a major new coordinated campaign using compromised websites to infect them with malware linked to the infamous Lazarus Group, according to Symantec.

2017-02-20

UK Under Attack By Russian & Chinese State Sponsored Hackers

GCHQ say that Britain is being hit by dozens of cyber-attacks a month, including attempts to steal defence and foreign policy secrets.

2017-02-17

Technology, Multilateralism, War and Peace

Wars are no longer only about combatants and tanks, but also about algorithms and bots. Opinion by Anje Kasperesen

2017-02-18

WhatsApp Becomes The Latest Victim

Is there a truly secure messaging app? Attackers could exploit a security vulnerability in WhatsApp to snoop on its users.

2017-02-20

How To Automate Cyber Defense

Humans aren’t fast enough to respond to network attacks and breaches. Machines can help us, if we help them.

2017-02-20

Deterrence & Cyber Attacks On The US Electoral System

Deterring future cyber-meddling in US elections will require convincing adversaries that the response will be painful & their efforts ineffective.

2017-03-14

Uber Wants Self-Flying Vertical Takeoff Cars

Elevate: Uber is making moves to expand the scope of its flying car experiment and has hired an expert from NASA to help with VTOL.

2017-03-20

Montreal’s Future In Smart Sensors And AI

Smart City: Montreal explores initiatives to leverage sensors, data collection & machine learning to deal with pressing municipal issues.

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

TAC Security

TAC Security

TAC Security is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.