FREE TO VIEW


« Back to News

2016-11-10

Google’s Ad Tracking Is Just As Creepy As Facebook's

Google has changed the way it tracks its users across the internet, merging users' personal identity data across Gmail, YouTube without consent.

2016-10-12

Trickle Down Cybercrime

October is National Cyber Security Awareness and this week’s theme, cybercrime.

2016-10-31

Data Strategies Are Not Keeping Up With Cloud Migration

Enterprise data protection strategies might not be fully aligned with IT modernization initiatives driven by cloud computing.

2016-11-07

So Far In 2016 Data Breaches Are Up 20%

The US Identity Theft Resource Center (ITRC) reports 783 data breaches recorded and more than 29 million records exposed so far this year.

2016-11-04

Russian General Brags About Cyberwar Successes

Russian General Valery Gerasimov advocates covert & propaganda tactics to cause a perfectly thriving state to “sink into a web of chaos".

2016-10-31

The Internet Shutdown In Ethiopia

There is a government Internet shutdown in Ethiopia which will drain millions of dollars from the economy.

2016-10-26

UK’s Financial Centre Suffering Massive Ransomware Attacks

Financial services professionals working in London's international business centre are at the highest risk of receiving ransomware.

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-26

US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

Donald Trump says Hillary Clinton has 'no idea' if Russian hackers are interfering in the US Elections, but James Clapper does.

2016-10-26

US Banks Face New Demands To Protect Themselves From Hackers

The US Federal Reserve and other US regulators decide to force the biggest financial institutions to plug vulnerabilities against hackers.

2016-10-27

Valuable Security Assets Are Human, Not Technical

The biggest threat to healthcare IT security is the human element. But if human beings are the problem that also makes them the largest asset.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.