FREE TO VIEW


« Back to News

2015-09-16

Russia & China Use Hacked Databases to Find US Spies

Foreign intelligence agencies are reportedly crosschecking hacked databases & compromised information for evidence.

2015-09-16

Should the US Use Hidden Data to Warn Industry of Attacks?

What is government’s role in leveraging the “Dark Web” to alert private-sector organizations they’re the target for attack?

2015-09-16

Getting Hotter: China vs US Cyberwar

US-China relations are taking a nosedive over the OPM hack but China is a victim too.

2015-09-15

Pentagon Will Counterattack Cyber Strikes

XD3 - DARPA are working on Extreme DDoS Defense with a recovery time of just 10 seconds following an attack.

2015-09-21

DEMOS: The Road to Representivity

Social media platforms, including Facebook,Twitter and the rest, are poorly researched and misunderstood.

2015-09-15

Decoding the DNS: A New Arena in Cyber Defence

Using DNS data as an intelligence gathering mechanism in the war against cyber-crime.

2015-09-15

A New Design for Cryptography’s Black Box

Advances in cryptography show how near-perfect computer security might be close at hand.

2015-09-21

Cybersecurity Is A Competition Issue For Business

Companies need to start thinking about how to measure and prepare for the real, business impacts of cyber threats.

2015-09-15

Tor Gets Help to Anonymise Users of 'dark web'

Two proposals have won approval from key Internet bodies that will limit how widely information is shared about sites hosted on Tor.

2015-09-21

Over 90% of UK Police Requests to Access Calls & Emails Are Granted

Campaigners find British Police were making a request every two minutes and getting access in 93% of cases.

2015-09-17

Cyber Threat: First Data Theft - Next Data Manipulation

US intelligence chiefs warn the next phase of escalating online data theft will involve the manipulation of digital information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Communications Security Establishment (CSE) - Canada

Communications Security Establishment (CSE) - Canada

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.