FREE TO VIEW


« Back to News

2016-06-15

Harvard Business School Wants To Know How To Win At Cybersecurity

HBS graduates now running cybersecurity companies discuss the lessons they have learned and identify some solutions.

2016-06-15

Tor’s Developer Leaves After Lurid Sexual Allegations

Senior Tor developer, Wikileaks hacker and Snowden advocate is forced to resign after rumors of assault emerged online.

2016-06-14

How To Define Cyberwar

What is it that is keeping US Intelligence and Military chiefs awake at night?

2016-06-14

Internet Power: Self Radicalisation & The Orlando Massacre

The Orlando gunman appears to have been motivated to kill by remote propaganda via the internet and social media.

2016-06-14

Now You See It: AI Will Become Invisible

In the near future, artificial intelligence will commonly become intangible, indistinguishable and incomprehensible for humans.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

Spying With Nano Robots Disguised As Insects

Spy technology emulates nature to develop successful controlled flight of a biologically inspired, insect-scale robot.

2016-06-13

Connected: The Mobile Police Station

Police in Spain are testing a vehicle equipped with technology that converts a patrol car into a real mobile police station.

2016-06-13

MI5's Uncontrolled Bulk Data Collection

MI5 has escaped regular scrutiny of its bulk collection of communications data, according to newly released confidential correspondence.

2016-06-13

First LinkedIn, Now Twitter ... Hacked User IDs For Sale

Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web.

2016-06-09

The FBI Is Looking For A Fight Over Encryption

After the public dispute with Apple over iPhone access the FBI is now bracing for a battle involving encrypted text messages, e-mails & other data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.