FREE TO VIEW


« Back to News

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

2015-06-29

The Coming Cyberpeace

The Normative Argument Against Cyberwarfare

2015-06-29

Data to Analyse Human Interaction with the Environment

Researchers are looking to the Internet of Things for new ways to analyze the relationship between humans & their environments.

2015-06-29

Google Enters Fray For Tesco Loyalty Unit

Tesco’s customer loyalty arm is for sale and Google are interested in buying. For $2 billion.

2015-06-29

How to Hire and Retain the Best IT Talent

How can a company without unlimited resources appeal to and maintain the workforce they need?

2015-06-29

Cambridge to Open Cyber Security Research Centre

The Cambridge Cloud Cybercrime Centre will focus on enhancing our understanding of cyber crime, security tools & techniques.

2015-06-29

NSA Has Reverse-Engineered Consumer Anti-Virus Software To Track Users

The NSA and GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks.”

2015-06-29

GCHQ's Surveillance of Rights Groups is Illegal

Although the interception was lawful, GCHQ retained emails for longer than it should have & violated its own internal procedures.

2015-06-29

The Dangers Of Internet-of-Things In Healthcare

Medical device connectivity to consumer technology raises alarming questions about privacy violation & intentional disruption.

2015-06-29

The Double-Edged Sword of Cyber Warfare

The Israeli army has recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea.

2015-06-29

FBI Alert: CryptoWall Ransomware Damage $18 Million

The most used vector are phishing emails that have a zipped attachment that claims to be a resume.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Secure Domains

Secure Domains

Secure Domains is the first company in the GCC to offer cloud-based DNS firewall services and security through its flagship SaaS product, DNS Armor.