FREE TO VIEW


« Back to News

2015-03-24

Beware of the Militarization of Cyberspace

Numerous hacking campaigns have been uncovered by security firms. In many cases, they have been attributed to state-sponsored hackers.

2015-03-23

Metadata Will Kill Your Privacy

The UK government inquiry into whether it conducts mass surveillance and the legality of such an effort has recommended tighter controls on access to communications metadata.

2015-03-24

Internet of Lousy Things

Anticipation doesnt necessarily mean that we are going to have a good time with the Internet of Things.

2015-03-24

Despite Snowden Leaks, Internet use is Largely Unchanged

Some Internet users worried about protecting their privacy have made basic changes to their online activities, most have not.

2015-03-24

Anonymous and Security Agencies: Bedfellows for Good Against ISIS?

Opinion by Dr Martin Wright. Global Institute of Cyber, Intelligence & Security (GICIS)

2015-03-25

Hackers Extort S. Korea for Data on Nuclear Plants

A hacker who posted inside information on South Korea’s nuclear power plants has made fresh threats.

2015-03-23

Latest Insurance Hack Affects 11 Million Customers

Premera Blue Cross suffered a hack, exposing claims and clinical data affecting 11 million US customers.

2015-03-25

Snowden: IT Workers Are Now the Target of Spies

Speaking at CEBIT, Edward Snowden warns that spy agencies target IT staff to gain access to key elements of internet infrastructure.

2015-03-19

After the Arab Spring, Surveillance in Egypt Intensifies

Egyptian information activists say that government surveillance is getting worse.

2015-03-18

Wikipedia challenging mass surveillance by NSA

Wikimedia Foundation, will file a lawsuit challenging the US government’s mass surveillance programme.

2015-03-18

Netherlands Court says Data retention a breach of privacy

Judges in The Hague says country’s regime for retaining telephone and Internet users helps to solve crime but is too intrusive.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Sealing Technologies (SealingTech)

Sealing Technologies (SealingTech)

SealingTech is a leader in cutting edge research, products, engineering, and integration services in the Internet of Things, Edge, Machine Learning, Artificial Intelligence, and Cloud.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

e-Safer

e-Safer

e-Safer's mission is to provide solutions and services that ensure a safer digital environment.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.

REAL Security

REAL Security

REAL Security is a market leader across the Adriatic region in value-added distribution in the field of IT Security & virtualisation.