FREE TO VIEW


« Back to News

2017-06-30

Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of recruits via social media.

2017-06-30

India Internet Shutdowns 'Violate Human Rights'

The Indian government has started to use arbitrary powers to shutdown telecoms networks, including the internet to quell public disorder.

2017-06-29

Petya Cyber Attack Hits EU & US

Victims of a major ransomware attack that has spread through the US and Europe can no longer unlock their computers, even if they pay the ransom.

2017-06-29

Does Canada Need Its Own CIA Or MI6?

Canada is the only G7 country without both a dedicated domestic and a dedicated foreign intelligence agency. Up until now.

2017-06-29

Industrial Robotics Market Will Triple

This year, the market value of industrial robots worldwide is estimated to hit $14 billion. By 2025, that market is projected to balloon to $33.8 billion.

2017-06-29

Cybersecurity Is A Bigger Issue Than Brexit

Cybersecurity is a top concern in the boardroom, to the point where it’s a more important issue than Brexit.

2017-06-28

Want A Career In Cybersecurity?

A growing cyber threat landscape and an estimated 1 million unfilled cybersecurity jobs worldwide means career opportunities are wide open.

2017-06-28

Intelligence-Led Policing Gets Automated

An Electronic Detective: VALCRI is a semi-automated analysis system that can reconstruct crime situations, generate insights and discover leads.

2017-06-28

EU Fines Google $2.7 Billion

Google systematically gave prominent placement in searches to its own comparison shopping service and demoted rivals in search results.

2017-06-28

Petya: The Latest  Global Ransomware Incident

Petya works similarly to the WannaCry ransomware that infected more than 230,000 computers in 150 countries last month.

2017-06-27

Facebook Deploys AI To Block Terror Propaganda

Criticism from legislators, advertiser boycotts and lawsuits by terrorist outrage victims are pushing Facebook to find better ways to banish terrorist activity.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).