FREE TO VIEW


« Back to News

2015-07-27

US vs Hackers: Still Losing

Computer networks of many U.S. federal agencies remain highly vulnerable to sophisticated cybercriminals.

2015-07-27

Internet of Things: A Mass Surveillance Infrastructure

‘The most powerful political tool ever created’

2015-07-27

Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees

Employees are the biggest threat to business integrity. As FireEye has discovered.

2015-07-27

Automobile Industry Gears Up For Cyber-Threat

Threat Response: Automobile industry's intelligence sharing & analysis center (ISAC) is revving up to exchange cyber threat information.

2015-07-27

Hundreds of Thousands' of Vehicles At risk of Attack

Chrysler contemplate mass recall & software update to protect recent model Jeeps from remote control takeover.

2015-07-27

Dating Website Admits Hackers Have Stolen Data on Millions

Impact Team: Ashley Madison dating is website is thoroughly hacked for personal data for 37m people.

2015-07-24

Delivered: America’s Drone Debut

A Drone made from 3D printed parts will be first to have FAA approval for package deliveries.

2015-07-24

Hacking Team's Malware Uses a UEFI Rootkit

A Hacking Team tool that can modify a computer’s UEFI (Unified Extensible Firmware Interface) even after the hard drive is wiped.

2015-07-25

Finland – Prolific Hacker Arrested & Sentenced

Julius Kivimaki found guilty of 50.700 “instances of aggravated computer break-ins” affecting Harvard, MIT & a host of companies.

2015-07-24

Public-Private Partnerships in the Cyber Domain

Many ostensibly private sector technology firms are closely aligned with a particular nation state. Opinion by Jamie Collier

2015-07-24

United Hackers Given a Million Free Air Miles

Wearing a white hat: Hackers who spotted security holes in United Airline's website are well rewarded.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.