FREE TO VIEW


« Back to News

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-11-08

Where The Money Is: Bank Robbers Blow Up 492 ATMs

Some 492 ATMs across Europe were blown up by thieves in the first half of 2016, as more criminals attempt to infiltrate bank machines via cyber-attacks.

2016-11-01

US Has A Strategy To Defend Against Another Massive IoT Attack

The US Dept. of Homeland Security is working fast to find ways to prevent another DDOS service attack like the one that occurred on October 22nd.

2016-10-31

ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media.

2016-10-31

Decrypting the Dark Web

Data analysis can highlight the trends in communication between bad actors who gather in underground forums across the Dark Web.

2016-10-31

Future Of Security: Connect Cyber With Physical Defence

With more items gaining web connectivity as part of the IoT trend, organisations cannot afford to separate physical security from cybersecurity.

2016-10-31

2016 Trends in Cyber Crime

According to Europol, the volume, scope and cost of Cybercrime have reached very high levels, and are set to get even higher.

2016-10-31

Work Traveling - You’re a Prime Hacker Target

There’s one very important thing to worry about while traveling in unfamiliar places: the security of your email.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-28

Internet of Insecure Things

Nightmare: The Internet of Things just keeps getting murkier and more problematic.

2016-10-28

Smartphone “Video Jacking” From Power Sockets

Major smartphone brands are vulnerable to the hacking threat called “video jacking' when plugged into public charging stations.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

SISA

SISA

SISA is a payment security specialist providing payment security assurance services, training and products to over 1,000 customers across the globe.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

CTM360

CTM360

CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to cyber threats.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.