FREE TO VIEW


« Back to News

2017-04-21

The Dark Web: What It Is And How It Works

It's not just about drugs, guns & porn. In the enormous hidden Web one person’s criminal paradise is another’s freedom fighting resource.

2017-04-21

The Next Big Conflict Will Turn On Artificial Intelligence

Whoever collects the most data on Day One just might win the next war before a even single shot is fired.

2017-04-21

Cyber Attacks Against Korean Missile Launches

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise.

2017-04-19

FBI’s International Framework On Encrypted Data Access

The FBI wants an international agreement between governments to ease fears about IT products with government-mandated backdoors.

2017-04-19

Safeguard Data When Employees Leave

Employee turnover comes with a variety of corporate, logistical and financial hurdles, they also create data protection & security problems.

2017-04-19

London Terrorist Attack Is A Wake-Up Call For Social Media

London Police Chief warns social media giants Facebook, Google & Twitter to 'put their house in order' following the deadly attack on Westminster.

2017-04-19

Stop Data Breaches, Start With Databases

A common source for numerous large scale data breaches are poorly secured databases that connect directly to the internet.

2017-04-19

Russian Propaganda Connections

Fake news stories are generated by unrecognisable websites using anonymous sources, hoping to be picked up by mainstream media.

2017-04-18

Cyber War Calls For A New Look US Soldier

Passing basic training and a drugs test: The best cyber warriors don’t always make the best soldiers.

2017-04-18

Ageing Energy Systems Hold Huge Potential For Cyber Attack

The systems that run the US electricity grid, gas pipelines & other critical infrastructure have 25 years’ worth of vulnerabilities that need fixing.

2017-04-18

WikiLeaks Has Published The CIA’s Secrets For Infecting Windows

Wikileaks' release of CIA secret hacking tools includes software to build customised malware to compromise computers running Windows.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.