FREE TO VIEW


« Back to News

2015-12-16

Kazakhstan: A Poorly Thought-out Surveillance Technique or an Experiment For the West?

Basically, the Kazakh government is snooping at the highest levels on its citizens. Opinion by Christoforus Papachristou

2015-12-15

British Universities Suffer Sustained Cyber Assault

University students & faculty across the UK have been affected after the academic computer network known as Janet came under attack.

2015-12-15

ISIS Counter-Attack Anonymous

Doxing: Islamic State are hitting back at Anonymous hacktivists

2015-12-16

Encounters Between Drones & Piloted Aircraft Are Increasing

Dangerous encounters between drones and planes are rising according to new statistics from the US Federal Aviation Administration.

2015-12-18

IBM’s $1 Billion Revenue Target For Cloud In 2016

IBM has set an internal revenue goal for SoftLayer, its cloud-infrastructure business, of $1 billion in 2016, a person with knowledge of the matter said.

2015-12-16

Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

2015-12-18

Third of UK Finance Logins Risk Client Data

Many industry personnel are not assigned unique login and password details, resulting in the risk of customer's personal and financial data.

2015-12-21

Email Data Breaches: The Threat Keeps Giving

2015 - A year of unprecedented data breaches. Major government agencies & consumer sites were hacked, millions of users were compromised.

2016-01-08

What Does a Cyber Security Strategy Look Like?

The top management and board of directors should own cyber security, its implementation and response.

2015-12-18

Facebook Rule Change After Privacy Ruling

Facebook is locking people out of its site unless they are registered users, following a Belgian privacy ruling.

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.