FREE TO VIEW


« Back to News

2015-11-09

Can EU Judges Keep NSA Spying in Check ?

According to EU Justice Commissioner, the NSA's blanket surveillance of Europeans will be subject to judicial review.

2015-11-09

Bank of England Partners With US for Cyberattack Simulation

The Bank of England is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

2015-11-07

New UK Surveillance Bill Appears In The Wake of Snowden

Is the proposed new legislation a gross intrusion of privacy or a sensible anti-terrorism measure?

2015-11-06

Russian Air Crash Investigation Changes The Encryption War

If intercepted communications prove an ISIS bomb caused the crash in Egypt, it could be just the boost surveillance state advocates need.

2015-11-06

NATO’s role in the cyber domain is unclear.

Would NATO go to war in response to a cyber-attack against one of it's members? Opinion By Jamie Collier.

2015-11-04

IBM Watson's Goodbye To Privacy

So much data that it can no longer be made sense of without artificial intelligence. Which has consequences for human privacy.

2015-11-04

Bitcoin Groups and Law Enforcement Unite

A group of digital currency companies and law enforcement agencies are getting together to improve communication with government.

2015-11-04

RBS Says Most Scam Victims Recover Nothing

The bank is not generally responsible for fraud, unless their advice, delays or other errors have resulted in the money being stolen.

2015-11-04

Stolen Credit Card Details Cost £1 Online

In the wake of the TalkTalk cyber-attack credit card details are on sale online for as little £1 each as fears rise over the security of personal data

2015-11-04

UK Forced To Backtrack on Internet ‘snooping’

While the U.S Senate has passed CISA unamended the U.K. Government is struggling to pass it's new surveillance law.

2015-11-03

EU Will Fund Car, Hospital & Airport IT Security

ENISA is stepping up to address numerous threats to critical infrastructure and help governments & businesses plan their response.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

VMware

VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.