FREE TO VIEW


« Back to News

2015-07-21

Cyberwarfare is Common in Russia

Hacker Hell: It's a virtual civil war ...

2015-07-21

4 Signs a Board thinks Security is Better than it Is

Ponemon Institute survey shows a gap in perception between boards of directors and IT executives.

2015-07-21

CyberSecurity Future: Humans & Machines Work Symbiotically

Outnumbered: Because of the IoT there will be over 40 billion connected devices in use within five years.

2015-07-20

Assange says NSA intercepts 98% of S. American Coms

A growing list of American allies, in addition to France & Germany are being spied on by the NSA.

2015-07-20

Repelling the cyber-attackers

Good cybersecurity is not just a technology function.

2015-07-20

The Most Damaging Ramifications of DDoS Attacks

Loss of customer trust & confidence are the most damaging consequences of DDoS attacks.

2015-07-20

Airlines on Defence Amid Cyber Warfare: IATA

Greater levels of automation mean the aviation industry is more vulnerable to cyber threats

2015-07-18

The Focus on Terror has Distorted the Debate on Encryption

The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski

2015-07-17

The Right for Privacy in a World Where Everything is Shared

The latest revelations about Hacking Team, its products & it its clientele seem to shock everyone. Lets’ see how truly shocking this is.

2015-07-16

NATO missile system hacked remotely by ‘foreign source’

A German Army Patriot missile system was allegedly hacked by a remote source.

2015-07-16

New Case Highlights Deep Hole in Cyber Insurance

Mistake Exclusion means a failure to maintain adequate data security can turn out to be very costly.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.

Sensiba

Sensiba

Sensiba are accountants, consultants, and experts in good business. We use deep industry experience to help organizations solve problems, navigate complexity, and build sustainable growth.

Legion Security

Legion Security

Complement your SOC team with an AI agent that observes your best analysts' investigations, learns their unique workflows, and scales them.