FREE TO VIEW


« Back to News

2016-07-17

US and EU Implement Privacy Shield

EU promises its citizens to restore trust when their personal information is transferred to the US by multinational companies.

2016-07-18

British Royal Navy Drone Ships Will Replace Sailors

Unmanned vessels will become central to efforts in minesweeping and anti-terror missions & will eventually replace most manned ships.

2016-07-17

Dallas Shooting: US Police Robot Kills Suspect

Police’s lethal use of a bomb-disposal robot worries legal experts who say it creates gray area in use of deadly force by law enforcement.

2016-07-18

Turkish Coup: Attempt To Block Internet Fails.

Attempts at blocking or slowing access to social media networks amid an attempted military coup in Turkey have not succeeded.

2016-07-15

Experts Warn of Malicious Brexit Spam

Security experts see an increase in Brexit-themed spam designed to trick recipients into downloading malware.

2016-07-13

Ukrainian Hacker Pleads Guilty to US Insider Trading Charges

A Ukrainian man has pleaded guilty to his role in an insider trading scheme that netted more than $30 million (£20.8 million) in illicit profits.

2016-07-14

Threat Intelligence Sharing Deals With Cybersecurity

Access to timely information and intelligence is vital in protecting organizations and firms against data breaches & security incidents.

2016-07-15

The Nation State Hack-Attack

Cyber-security is not all about cyber-thieves. It is about cyber-spies too.

2016-07-15

Infrastructure Security in the Age of Ransomware

Critical infrastructure including electric and water utilities are being temporarily shut down as ransomware plagues corporate systems.

2016-07-13

Air Gapping Critical Process Control Networks

Oil giant Chevron has chosen to air gap critical systems to disconnect them from the Internet as much as possible.

2016-07-15

Your Server Has Been Hacked… What Next?

Online criminals trawl the net looking for vulnerable servers. The long-term the chances of an Internet-facing server being hacked approach certainty.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.