TECHNOLOGY > > Hackers


« Back to News

2016-11-18

Cyber-attacks & Hacking: What You Need To Know

Is the UK Government's investment of £1.9 Billion in cybersecurity defence plus a retaliatory capability really enough to address all the threats?

2016-11-11

The US Cyber Threat Against Russia

Off The Record: The US has penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems.

2016-11-08

IoT Is A Cyberwar Nightmare

The world got a glimpse of the future when a large-scale cyberattack prevented access to many key websites, exposing big concerns about the IoT.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

2016-11-01

Shadow Brokers Release Secret List Of NSA-Compromised Servers

The Shadow Brokers hacking group who claimed to have leaked a portion of the NSA’s hacking tools and exploits is back with a Bang.

2016-11-07

North vs. South: Cyber Warfare In Korea Is Escalating

N. Korean government entities spearheading propaganda efforts are operating task forces to post comments on Internet portals in S. Korea.

2016-11-09

Find The Hacker With Action Security Intelligence

Developing actionable security intelligence requires gathering multiple insights regarding the identity, methods & motivation of the attacker.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-11-01

US Has A Strategy To Defend Against Another Massive IoT Attack

The US Dept. of Homeland Security is working fast to find ways to prevent another DDOS service attack like the one that occurred on October 22nd.

2016-10-31

Decrypting the Dark Web

Data analysis can highlight the trends in communication between bad actors who gather in underground forums across the Dark Web.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

National Defense Industry Association (NDIA) - USA

National Defense Industry Association (NDIA) - USA

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.