FREE TO VIEW


« Back to News

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

2016-07-12

Four Threats To Aviation Security – and Four Responses

From terrorist attacks to geopolitical posturing, aviation is reaching the frontline of global security & cyber risks. Opinion by Anja Kaspersen.

2016-07-11

NATO & Pentagon Want Bitcoin Technology

Blockchain technology has many applications. Finance firms want it to cut admin costs & trade faster. Now it’s the military’s turn.

2016-07-11

Did N. Korea Hack S. Korea’s Key Defense Contractor?

Naval shipbuilder Hanjin Heavy Industries & Construction has suffered a serious hack and North Korea is the top suspect,

2016-07-11

Hillary Clinton’s Email Problems Just Get Worse

The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. What next?

2016-07-11

China’s South Sea Cyber War

Beijing's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-08

Brexit Fallout Continues – ePrivacy

UK losing influence over the EU review of online privacy laws just as the long-running dispute over transatlantic data transfers appears to be settled.

2016-07-08

Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but is only now becoming a popular safeguard against hackers.

2016-07-07

Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS

MI6 was misled to believe Saddam Hussein was producing WMD by a false agent who based his reports on a Hollywood action movie.

2016-07-08

Tesla Test Driver Dies On Autopilot

A Tesla test driver was killed in the first known fatal crash involving a self-driving car. He was watching a film at the time of collision.

2016-07-06

Is Edward Snowden Really A Russian Agent?

To anybody acquainted with how Russia’s powerful intelligence services operate, the idea that Snowden is their collaborator is hardly controversial

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.