FREE TO VIEW


« Back to News

2016-04-18

Were Brussels Terrorists Trying To Build 'dirty bomb'

The ISIS terrorists who blew up Brussels airport and attacked the metro were secretly videotaping a Belgian nuclear official.

2016-04-15

Donald Trump Has A Plan for CyberWar

Donald Trump has elaborated some bold and belligerent foreign-policy prescriptions.

2016-04-12

UK Investigatory Powers Bill Will Cost £1bn To Implement

The UK Home Office has been told its plans to retain web-browsing history of all British citizens for 12 months would cost in excess of £1bn.

2016-04-13

The Next Decade Will Be About The Industrial Internet

Corporate giant GE has outlined some fundamental insights about the digital transformation efforts of industrial businesses.

2016-04-13

Execs: We’re Not Responsible For Cybersecurity

More than 90% of corporate executives say they can't read a cybersecurity report and are not prepared to handle a major attack.

2016-04-11

Will Capitalism Survive The Robot Revolution?

If 90 percent of human jobs are replaced by robots in the next 50 years, will capitalism remain the ideal economic system?

2016-04-11

Eight Reasons Why US CEOs Care About New EU Privacy Laws

A major change is on the way in how American companies must handle European citizens’ personal data.

2016-04-11

Taliban App Removed From Google Store

Alemarah, an app for Android phones created by Islamist fundamentalist group the Taliban, has been removed from Google's Play Store.

2016-04-14

The Darkest Web

TOR is an essential tool for carrying out investigations in law enforcement. It is also used by criminals. Opinion by Max Vetter (distressing content)

2016-04-08

WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.