FREE TO VIEW


« Back to News

2016-07-06

China’s Cyber War Capabilities Alarm The Neighbours

China's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-05

Donald Trump, Hillary Clinton & Russian Hackers

Sophisticated hackers are attempting to penetrate the computer networks of all the US Presidential candidates.

2016-07-05

Preventing Hackers From Accessing Financial Information

Combating hackers with voice biometric authentication of customers adds another layer of security to prevent growing fraud.

2016-07-05

IBM Computer To ‘Help’ Accountants

KPMG Australia has signed a deal with IBM to use the Watson supercomputer to do big company audits.

2016-07-05

Hackers Steal $10m From Ukrainian Bank

More grief for the interbank platform SWIFT as hackers extract $millions from an undisclosed bank in Ukraine.

2016-07-04

US & Israel Agree To Co-operate In Cyber Defense

Israel & US agree real-time operational connectivity through the Computer Emergency Response Teams (CERTS) of both nations.

2016-07-04

Is Moscow Trying To Influence The US Presidential Election?

It would seem that Vladimir Putin favours Donald Trump to be US President and is trying to do something about it.

2016-07-01

Frankenstein’s Paperclips

Rules governing the behaviour of AI systems have had currency since Isaac Asimov invented the “Three Laws of Robotics”. Now we need them.

2016-07-01

Government In The Information Age

Alvin Toffller's predictions for the evolution of the Industrial Era into the Information Age are coming true; the role of government must evolve too.

2016-07-01

Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon

An Element Of Absurdity: Edward Snowden's lawyers have vowed to step up pressure on Barack Obama for a Presidential Pardon.

2016-06-30

What Might ‘Brexit’ Mean For Cybersecurity In The UK?

While some cybersecurity pros say that Brexit will have little ill-effect on the industry, others aren't so sure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Mindgard

Mindgard

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.