FREE TO VIEW


« Back to News

2015-09-09

Snowden Has No Plans to Leave Russia

His lawyer says it's all fine and dandy in Moscow, although Edward Snowden is not considering applying for Russian citizenship. Yet.

2015-09-09

Humans Should Ban Artificially Intelligent Weapons

Manufacturers & governments developing lethal AI weapons claim proper safeguards can be engineered. We doubt it.

2015-09-09

MH370 Gentle Landing Theory

Opinion By OliverMcGee

2015-09-08

Hackers Target Saudi Government Websites

Over 24 Saudi government websites have been hacked despite the fact that the hackers gave advance warning.

2015-09-09

Pentagon to Wage War on DDOS Attacks

New tools enabling the U.S. Defense Department to make a rapid response to distributed denial-of-service attacks.

2015-09-09

Pentagon Increasing Drone Flights By 50%

The Pentagon is planning to increase the number of drone flights by 50% to meet the US demands for surveillance & air strikes.

2015-09-08

Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat

Anonymous Malaysia threaten Internet 'Warfare'

2015-09-08

Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

2015-09-07

Cognitive Computing: What Can and Can’t Be Done.

Can computers solve the kinds of woolly, messy problems that humans deal with every day?

2015-09-07

Cyberspies Impersonate Security Researcher

A cyber espionage group turned the tables on a security researcher: the attackers impersonated the researcher in a spear-phishing email attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Rule4

Rule4

Rule4 is a global professional services firm that provides practical, real-world knowledge and solutions in areas including cybersecurity, AI, Machine Learning and industrial control systems.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.