FREE TO VIEW


« Back to News

2015-06-08

Data Stolen in Hack Attack on German Parliament

Hackers gained access to the Bundestag's internal server, launching an unprecedented attack using Trojan viruses.

2015-06-08

Pentagon To Relaunch $475 Million Cyber Effort

After cancelling its search for bids on a five-year outsourcing contract, US Cyber Command say a retooled version will be out by October.

2015-06-08

Rethinking Cybersecurity in the Age of the Hacker

If even the best-resourced companies are losing the cyber-security battle, what hope is there for the rest of us?

2015-06-08

Nasdaq Bets on Bitcoin's Future

The US stock exchange Nasdaq is experimenting with incorporating the underlying technology of the bitcoin cryptocurrency into its pre-IPO trading arm.

2015-06-08

Bigger than Heartbleed - 'Venom' Threatens Datacenters

Before Heartbleed: Worst vulnerabilities ever?

2015-06-08

US Calls for Cyber Reform After Massive Hack

The White House urges Congress to come out of the "dark ages" and pass new cyber security rules.

2015-06-06

Russia's Greatest Weapon May Be Its Hackers

In hacker jargon, it’s called a “cyber-to-physical effect.” It’s when a hacker reaches out from the virtual world into the real one, often with catastrophic consequences.

2015-06-06

Gartner Predicts Three Big Trends for Business Intelligence

Gartner has identified three trends describing information’s ability to transform business processes over the next few years.

2015-06-06

Flaw in YouTube Allows Removal of Any Video

Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube.

2015-06-06

Silk Road Investigators Charged for Stealing Bitcoin

Two former US government agents face charges related to stealing hundreds of thousands of dollars worth of bitcoin.

2015-06-05

Unplugged: What the End of Metadata Collection Means for Intelligence

How useful is Metadata to the intelligence community and what will they do if it goes away?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Check Point SASE

Check Point SASE

Check Point SASE (formerly Perimeter 81) is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Nubeva Technologies

Nubeva Technologies

Nubeva provide a breakthrough TLS Decrypt solution with Symmetric Key Intercept to gain the visibility needed to monitor and secure network traffic.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

VMware

VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.

Borneo

Borneo

Borneo is a Data Security Platform that helps organizations discover, classify, and remediate data and AI governance risks at scale while maintaining continuous compliance.