FREE TO VIEW


« Back to News

2016-03-15

Communications Breakdown: CISOs & Company Boards

We Don't Talk Anymore: Chief Information Security Officers (CISO) and the board of directors don't adequately share cybersecurity threat information.

2016-03-15

Who Is Winning The Cyber War?

Who is winning the cyber war - the criminals and hackers or the network and system defenders? The State of Cybersecurity: 2016.

2016-03-14

Recovered IS Document Reveal 22,000 Recruits

Secret Islamic State documents naming 22,000 jihadist fighters including 16 Britons intercepted by German intelligence.

2016-03-14

Google's AI Machine To Battle 'Go' Champion

Master of the ancient Asian board game Go will sit down to defend humanity against Deep Mind.

2016-03-14

China Cracks Down On Top Hong Kong Newspaper

Firewall Censorship: Social media accounts of the South China Morning Post suspended and the media group's news websites blocked in China.

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-18

UK Bosses - Heads In The Sand Over Cybercrime

Clear evidence of the growing threat is still not causing British businesses leaders to increase their protection.

2016-03-19

Underwater Drone Technology Could Doom Trident

New technologies, both unmanned underwater vehicles (UUV) and advanced sensors, could make the world’s oceans “transparent” to submarines.

2016-03-09

Cool Job: Professor of Intelligence Analysis Program at James Madison University

James Madison University are looking for someone to teach the next generation of intelligence analysts & cyberspies.

2016-03-08

Cyber Criminals Have Evolving Tactics

The financial world should be bracing itself for what is set to be a big year for cyber-crime, according to ThreatMetrix's new report.

2016-03-07

A Cashless Society? Be Careful What You Wish For

Cash is being rapidly dethroned as increasing numbers of countries focus on digitalizing their economies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.