FREE TO VIEW


« Back to News

2016-09-08

Hong Kong Hacked

Two Hong Hong government agencies have come under attack from cyber-spies originating in China.

2016-09-14

Cybercrime & Cyberwar: A Spotter's Guide

Cybercriminals are as varied as other Internet users: They have different tools, objectives & specialties. Understanding them can defend against them.

2016-09-10

Critical Infrastructure Is The Next Target

The way we think about cyber-attacks changed when Ukraine experienced the first recorded power outage caused by a cyber-attack.

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-17

Australian Government Networks Hacked

Sensitive Australian Government and corporate computer networks have been penetrated by sophisticated cyber-attacks.

2016-09-19

UAE Using Israeli Spy Technology

The United Arab Emirates uses Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

2016-09-09

Are US Voting Machines Secure From Hackers?

Some states have declined to scan voting systems for hackers ahead of the presidential US elections.

2016-09-08

Islamic State Members Embedded In Government

The Kuwaiti interior ministry has arrested a governmental insider for hacking the official websites and spreading the IS propaganda.

2016-09-09

Cyber Vulnerability Identified In Major Weapons Systems

The US Pentagon is worried about uncovering cyber flaws in it's strategic weapons systems.

2016-09-21

Who Are We In the Cyber World?

Reading List: Mary Aiken's book 'The Cyber Effect' is about how the Internet is shaping development, behavior and our perception of the world.

2016-09-08

Thai Cyber Bank Fraud Gang Busted

Thai police have caught a gang who stole personal information through an elaborate, Internet-enabled scam.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.