FREE TO VIEW


« Back to News

2017-07-13

Twitter May Introduce A 'Fake News' Flag

A new feature that would let users flag tweets that are false or inaccurate, in an attempt to combat the spread of disinformation on the platform.

2017-07-12

Australia’s Sharp Turn To Information Warfare

The Australian government responds to regional threats and moves towards the defence concept of 'information dominance'.

2017-07-12

Islamic State On The Internet

Project TENSOR: British police working on improving methods of detecting terrorist content

2017-07-11

Insurance: How Cyber Risks Are Evolving

Lloyds of London say that both the costs and the ways in which companies can be targeted by organised cyber criminals are increasing.

2017-07-11

Self- Drive Vehicle Are Confused by Kangaroos

Volvo's self-drive system can identify and avoid deer, elk and caribou, but testing in Australia shows it cannot adjust to kangaroos.

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-07-10

Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Reverse Gear: Plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.

2017-07-10

GCHQ Unveils Its Cybersecurity Playbook

The UK National Cyber Security Center has created four “simple and free measures” that public sector bodies can implement immediately.

2017-07-10

Prices For Stolen NSA Exploits Go Higher

Both Petya and Wannacry are strains of malware derived from NSA exploits stolen by the mysterious Shadow Brokers. Now they want more money.

2017-07-10

Fallout From Petya On Global Shipping

Petya shows the scale of the damage a computer virus can unleash on a technology dependent and inter-connected industry.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

National Cybersecurity Student Association (NCSA)

National Cybersecurity Student Association (NCSA)

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.