FREE TO VIEW


« Back to News

2016-12-27

Malicious Ads Expose Millions To Hacking

Millions of Internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install Trojans and spyware.

2016-12-27

Cybersecurity: A Personal Plan

Online, hooked up, plugged in and "on the cloud": Invest in securing your data; it may be the best investment you ever make.

2017-01-17

Cuban Telecom Etecsa Starts Home Internet Trial

Surveillance State Relaxes: The Cuban government has announced a two-month trial to allow internet access in private homes for the first time.

2017-01-16

Turkish Lender Akbank Under Attack

Missing: $44m vanishes after hackers target Turkish financial institution Akbank using the SWIFT money transfer system.

2017-01-05

Check If Your VPN Is Leaking Private Data

A virtual private network (VPN) is a great way to keep your Internet usage private & secure at home or on public Wi-Fi. If it's not leaking.

2017-01-09

Germany Wants To Order Social Media To Police Hate Speech

Germany is considering new laws to force social media platforms to take a more active role in policing illegal hate speech on their sites.

2017-01-13

UK Schools & Teaching Computer Science

A revolution is under way in the teaching of computer science in schools in England, but it risks leaving poorer pupils behind.

2016-12-22

Yahoo’s Latest Billion Breach!

The scale of a second Yahoo data breach is massive, but although the attack took place in 2013 it is only in December 2016 that Yahoo made this public, because even they did not know about it until November 2016!

2017-01-04

Smartwatch Technology For Police Forces

A new generation of smartwatches and apps are giving police forces a practical wearable option, offering versatility in a convenient lightweight form.

2016-12-31

Claims That Google's Search Algorithm Spread False Information

Dont Be Evil: Google’s search algorithm appears to be systematically promoting information that is either false or slanted.

2017-01-03

Cyber Deterrence: How To Curb Cyber Attacks

Deterrence focused on making potential adversaries think twice about an attack has worked for nuclear weapons. What about cyber weapons?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.