FREE TO VIEW


« Back to News

2016-06-30

NATO Does Not Appear To Have A Clear Cyberwar Strategy

NATO commanders do not seem prepared to take aggressive countermeasures against low-level probes, espionage and cyber attacks.

2016-06-30

Intelligent Robots And Automation Encroaching On All Industry Sectors

We’re seeing automation of labor across every industry, including manufacturing, wealth management and medicine.

2016-06-29

ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA seeks to track how ISIS spreads its ideas, and how well the it's defenses are working.

2016-06-27

The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital. Opinion By Alfred Rolington

2016-06-28

False Flags: The Kremlin’s Hidden Hand

The notorious hacking gang calling itself the Cyber Caliphate might not be what it claims to be.

2016-06-29

Charge Companies for Cyber Security Failures

British MPs recommended that companies should be fined if they fail to guard against cyber-attacks, following last year's TalkTalk hack.

2016-06-28

Russian Cyber Gangs Linked To Bank Robberies

Investigators have linked malware used by Russian and eastern European cyber-gangs to a string of bank thefts perpetrated using SWIFT.

2016-06-29

The Cyberwar Frontier In Korea

North Korea's "cyber army" has doubled in size to 6,000 troops and the South is racing to increase its capability to meet the rising threat.

2016-06-30

For Sale: Access to 70,000 Hacked Computer Networks

Kaspersky has uncovered an online marketplace where criminals sell access to more than 70,000 hacked corporate & government servers for $6 each.

2016-06-29

New US Biometric Passport Regulations Will Prevent Entry To Millions

The US government has quietly introduced requirements for all travelers to hold electronic biometric passports to enter the country.

2016-06-29

Hackers Target Vulnerabilities Across US Politics

Russian hackers have burrowed deep into the US political system, sweeping in law firms, lobbyists, consultants, foundations and think tanks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.