FREE TO VIEW


« Back to News

2017-09-19

What Is The Stuxnet Worm?

Stuxnet is a computer worm that targets industrial control systems to inflict damage, but is most famous for being the first genuine cyber-weapon.

2017-09-18

Which Countries Are Ready For Cyberwar?

Including the usual suspects, over 30 countries are developing offensive cyber-attack capabilities, although their programmes are shrouded in secrecy.

2017-09-18

S. Africa’s Model For Cybesecurity

S. African organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution.

2017-09-15

Cyberwar: A Guide

At its core, cyber warfare is the use of digital attacks by one country to disrupt the computer systems of another to create significant destruction.

2017-09-13

Millions of Instagram Users Hacked

Claims that six million Instagram accounts have been hacked and 'Facebook/Instagram has not yet fully understood the full scope of the exploit'.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-12

Disastrous Equifax Breach Exposes 44% Of The US Population

Executives run for cover as credit reporting giant Equifax loses the confidential data of 143m users to criminal hackers.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-14

New AI Claims To Determine If You Are Gay Or Straight.

Hard To Believe: Artificial Intelligence can accurately guess whether people are gay or straight, based on photos of their faces.

2017-09-12

How Dangerous Is ISIS In The Cyber Domain?

ISIS has a wide range of commercial technological capabilities and knows how to use the power of social media to conduct global operations.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.