News

2015-01-14

‘Anonymous’ Call For Revenge On Charlie Hebdo Terrorists

“Anonymous from around the world have decided to declare war against you, terrorists” a purported member of the hacktivist group said in a video uploaded to YouTube, referring to the killers responsible for the attack on French satirical newspaper Charlie Hebdo. Speaking in French on Anonymous’s Belgian channel, the cyber vigilante warned terrorists, “We will track all your online activity, we will close your accounts on every social network.”

2015-01-15

Cybercrime? Blogger gets Flogged for ‘Insult to Islam’

A Saudi Arabian blogger has been publicly flogged after being convicted of cybercrime and insulting Islam, reports say.

2015-01-12

MI5 seeks new powers after Paris magazine attack

Andrew Parker describes Charlie Hebdo outrage as ‘a terrible reminder of the intentions of those who wish us harm’

2015-01-09

Cyber Security Insurance Underwriters Demand their Clients Understand the Threat Landscape

Insurance underwriters aren't looking for companies impervious to risk. They want clients that understand the threat landscape and have demonstrated abilities to mitigate attacks.

2015-01-09

Google faces US privacy suit over user data policy

A California court has allowed a privacy class action suit against Google to continue, though only in part.

2015-01-07

Mass Surveillance: The Internet’s best engineers are fighting back

The Internet Engineering Task Force (IETF) has played down suggestions that the NSA is weakening the security of the Internet through its standardization processes...

2015-01-06

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?

The US will sanction North Korea by an executive order signed by President Obama, which will target ten North Korean officials and three government entities. The sanctions are in response to the December hack on Sony that the US blamed on North Korea.

2015-01-06

Malaysia Airlines flight MH370 theories: 17 possible explanations that could reveal fate of plane

A former airline director has claimed that the US military may have shot down Malaysia Airlines flight MH370 in the latest theory about what happened to the missing plane.

2014-12-29

Cyber Insurance: Are you Covered?

By carefully considering your liabilities and proactively planning for incidents, you can do a great deal to ensure your company isn't the next cyber victim.

2014-12-23

New York premiere of Sony film The Interview cancelled

The New York premiere of The Interview, a comedy about the assassination of North Korea's president, has been cancelled amid threats from hackers. Now Sony Pictures has cancelled the planned US release on 25 December of the film The Interview, after major cinema chains decided not to screen it.

2014-12-10

150 million cars will be connected to the Internet by 2020

In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc. By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.