NEWS > News Analysis


« Back to News

2017-03-08

Norway Says Cyber Attacks Came From Russia

Norway’s institutions have been targeted in a cyber attack by a group suspected of having links to the Russian government.

2017-02-15

An Intelligence Crisis In Moscow

Russia is hunting for moles in its security apparatus who might have leaked information about efforts to influence the US presidential election.

2017-03-13

EU Tools Up For Cyber War

As the individual member states rapidly progress in their own personal cyber arms race, the EU’s own institutions risk being left behind.

2017-02-27

Could Britain Fight A Cyber War with Russia?

Can the UK and its NATO allies compete on the cyber battlefield as much as they do in the conventional spheres of air, land & sea warfare?

2017-03-10

How To Eliminate Insider Threats

Insider cyber threats are a major security problem and the highest level of risk to data security is not external but lies within an organisation.

2017-02-22

Only 20% Of UK Banks Can Properly Detect Breaches

Half of British financial institutions have no adequate data security frameworks or privacy policies. Few of them can confidently detect breaches.

2017-03-10

The 4th Industrial Revolution:Can Democracy Survive ?

The general reshaping of industrial and social life might be making traditional mass participatory institutions & political organisations unviable.

2017-03-09

Security Directly Impacts The Bottom Line At Banks

Banks now recognise that security has a valuable untapped role to play that can deliver immediate tangible results across the entire organisation.

2017-03-09

Healthcare Staff Trigger Google Cyber Defense

So many of the UK’s National Health Service (NHS) staff are using Google's search engine they have triggered its cybersecurity defences.

2017-03-07

Behavior Analytics Will Leapfrog Security

“Credentials-based attacks” using stolen passwords or other authentication mechanisms, cannot be detected by conventional security systems

2017-03-07

Twitter Gains 2m Users But Loses $457m

Although Twittter's current significance in electoral politics is unquestioned, the social media platform's business model is under scrutiny.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.