FREE TO VIEW


« Back to News

2015-03-24

FBI Plans to Expand its Hacking Powers

A US judicial advisory panel quietly approved a rule change that will broaden the FBI’s hacking authority despite fears of a “monumental” constitutional concern.

2015-03-24

Self-driving Cars May Lead to Human Driver Ban

Self-driving cars are "almost a solved problem," says Elon Musk.

2015-03-24

UK Police Should Retry Gun Technology Sensors

ShotSpotter promises to save police having to hunt door-to-door in the vague vicinity of gunfire.

2015-03-24

Jobs for Cyber Superstars

Raytheon has emerged as an industry leader in developing Cyber resilience, and their Cyber specialists help other organisations develop their Cyber capabilities.

2015-03-23

Cyber War Exercise in Central London

Cyber defenders gathered in London to take part in a cyber terrorist attack simulation run by the Cyber Security Challenge UK.

2015-03-24

Europe’s Data Privacy Laws Annoy US Tech Companies

Europe is closer to approving new data-privacy legislation that threatens to raise tensions with US technology firms.

2015-03-24

Beware of the Militarization of Cyberspace

Numerous hacking campaigns have been uncovered by security firms. In many cases, they have been attributed to state-sponsored hackers.

2015-03-23

Metadata Will Kill Your Privacy

The UK government inquiry into whether it conducts mass surveillance and the legality of such an effort has recommended tighter controls on access to communications metadata.

2015-03-24

Internet of Lousy Things

Anticipation doesnt necessarily mean that we are going to have a good time with the Internet of Things.

2015-03-24

Despite Snowden Leaks, Internet use is Largely Unchanged

Some Internet users worried about protecting their privacy have made basic changes to their online activities, most have not.

2015-03-24

Anonymous and Security Agencies: Bedfellows for Good Against ISIS?

Opinion by Dr Martin Wright. Global Institute of Cyber, Intelligence & Security (GICIS)

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.