FREE TO VIEW


« Back to News

2016-03-30

Anonymous Threaten ISIS After Belgium Attacks

Anonymous has come forward and issued a threat against the Islamic State terrorist group, warning of impending cyber-attacks.

2016-03-29

NSA Hacked Penatgon Command-Control In 4 Days

History: In the first-ever exercise testing the US military's cyber defenses in 1997 the NSA hacked into the DoD's entire network in 4 days flat.

2016-03-29

Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.

2016-03-29

FBI Can Unlock iPhone Without Apple’s Help

US authorities have cancelled the court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s iPhone.

2016-03-29

Clinton Emails Suggest Google's Assistance In Undermining Assad

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime.

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

2016-03-22

Cybercrime Is Changing

The anonymous and borderless nature of cybercrime puts every organisation at potential risk.

2016-03-22

ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks.

2016-03-25

Now Ambulances Are Vulnerable To Hackers

Cybersecurity in connected-vehicles is a big concern and few vehicles are more connected than ambulances.

2016-03-28

A Cashless Society Can’t Fix Our Money Worries

The advent of the cashless society is as certain as driverless cars or improved automated work tasks.

2016-03-23

NSA Using The Cloud To Thwart The Next Snowden

In a post-Snowden world, is it really a good idea to have analysts swimming around in one vast ocean of NSA secrets and data?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.