FREE TO VIEW


« Back to News

2017-02-21

Wikipedia's editors cut out the Daily Mail

News that a few dozen Wikipedia editors had decided that the Daily Mail should be “generally prohibited” from being used as a source caused consternation among many in the media.

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

2017-03-27

Data Breaches Attack All Parts Of A Business

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

2017-03-23

Ethics of Drones, Remote Weapons and Robots

Remote and autonomous weapons raise new questions about the boundaries between peace and war, and the nature of future conflicts.

2017-02-21

Robots Will Repair Satellites In Space

The Pentagon is developing robots that can repair satellites in space, more than 20,000 miles above Earth.

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The British government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-03-20

Law to Imprison Journalists for Publishing Leaks

Espionage Act: A new law designed to tackle international espionage could be used to imprison British journalists who obtain leaked material.

2017-02-21

Privacy Groups say FBI Hacking went too Far!

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

2017-03-22

Handbook Of Russian Information Warfare

NATO just published a new guide to Russian capabilities and intentions for combined information & cyber warfare.

2017-03-24

Snowden Says Report Proves He’s Not A Spy

Edward Snowden says reports that Russia might deport him to the US as a “gift” to Donald Trump vindicate him of charges that he is a spy.

2017-02-21

Global Banks Hit by Watering Hole Blitz

Over 100 organisations worldwide have been hit by a major new coordinated campaign using compromised websites to infect them with malware linked to the infamous Lazarus Group, according to Symantec.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.

Qwiet AI

Qwiet AI

At Qwiet AI we enable you to prevent cyberattacks by securing code from the start. Secure code in three steps.