FREE TO VIEW


« Back to News

2016-11-04

Russian General Brags About Cyberwar Successes

Russian General Valery Gerasimov advocates covert & propaganda tactics to cause a perfectly thriving state to “sink into a web of chaos".

2016-10-31

The Internet Shutdown In Ethiopia

There is a government Internet shutdown in Ethiopia which will drain millions of dollars from the economy.

2016-10-26

UK’s Financial Centre Suffering Massive Ransomware Attacks

Financial services professionals working in London's international business centre are at the highest risk of receiving ransomware.

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-26

US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

Donald Trump says Hillary Clinton has 'no idea' if Russian hackers are interfering in the US Elections, but James Clapper does.

2016-10-26

US Banks Face New Demands To Protect Themselves From Hackers

The US Federal Reserve and other US regulators decide to force the biggest financial institutions to plug vulnerabilities against hackers.

2016-10-27

Valuable Security Assets Are Human, Not Technical

The biggest threat to healthcare IT security is the human element. But if human beings are the problem that also makes them the largest asset.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

All Tesla’s Cars Will Have Full Self-Drive

Tesla has announced that all US Tesla cars made from now on will have all the hardware they need on board to achieve full self-driving.

2016-10-26

Media Vulnerable To Election Night Cyber-Attack

US media organisations have failed to properly protect their newsrooms which are vulnerable to a chaos-creating hack around Election Day.

2016-10-25

Hackers 'weaponised' Malware To Mount Massive Assault

The huge weekend attack on global Internet access is believed to have been unleashed by hackers using common IoT devices.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.