NEWS > News Analysis


« Back to News

2015-06-27

Hackers target Polish airline carrier LOT

An "IT attack" meant the airline unable to create flight plans and flights were not able to depart from Warsaw.

2015-06-27

NSA Chief: Don’t Assume China Hacked OPM

The cybersecurity group FireEye says it’s “highly confident” that Chinese hackers did it but Admiral Rogers is not so sure.

2015-06-27

Data Security and Loss of Control Killing Cloud?

Opinion By Frank Jennings Cloud & Commercial Lawyer at Wallace LLP

2015-06-25

US spied on French presidents

Espionage Elysee: How the NSA spied on communications of 3 French presidents as well as French ministers & the ambassador to the US.

2015-06-24

A Quick Tour in the Web Black Market

The most important requirement for both buyers and sellers is the anonymity of the transaction using untraced networks & virtual currency.

2015-06-23

WhiteHat Security: Majority of Websites Are Vulnerable to Data Thieves

Public administration websites had the worst record with 64% at risk every day, followed by Retail at 55%.

2015-06-23

Financial Services Firms Stare into the Abyss as Data Breaches Rocket

The UK Information Commissioner’s Office reports 791 breaches in this sector between 2012 and 2014, including 585 in 2014 alone.

2015-06-23

PwC says UK Security Breaches Often Not Reported

The majority of UK organisations suffering a security or data breach will never report it.

2015-06-23

FBI Unable to Monitor ISIS’s Encrypted Communications

The FBI has warned US lawmakers there was no way to monitor encrypted online communications.

2015-06-22

Cyberwar: Enter the Trolls

The OPM breach is a case of informational smash & grab. But operations to plant misinformation are important too.

2015-06-22

Top 6 Hacking Tools Security Teams Should Know About

Black Hat or White Hat: Here are the top 6 hacking tools that every security professional ought to know about.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

BlackScore

BlackScore

BlackScore is a technology company seeking to disrupt risk assessment using AI-driven technology.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.