FREE TO VIEW


« Back to News

2016-05-04

Cybersecurity Training For US Undergraduates Is Dismal

Graded F. A recent study reveals dismal stats about cybersecurity education for US undergraduates.

2016-05-04

US Cyber Bombs On ISIS Change The Nature Cyber War

US Cyber Command is going on the offensive with aggressive online operations to augment lethal conventional military force with cyber capabilities.

2016-05-04

Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Africa and counter-efforts are struggling.

2016-05-03

US Army's $12bn Mobile Internet Is Vulnerable

Improvements are needed to user training techniques, procedures, hardware and software enhancement to harden against cyber-threats.

2016-05-04

Fear This Man And His Hacking Empire

Hacking Team is among the few dozen private contractors feeding the world’s law enforcement & intelligence agencies with spyware.

2016-05-02

South Korea Is No.1 Top Source Of DDoS Attacks

South Korea accounts for a proportion of global DDoS responsibility more than the next three countries combined.

2016-05-02

Driverless Trucks Are On The Way.

No technology will automate away more jobs, or drive more economic efficiency, than the driverless truck.

2016-05-02

Snowden Intervenes In The Encryption Debate

Speaking from safety in Moscow, Snowden argued that the security of the Internet is more important than the convenience of law enforcement.

2016-05-02

Bangladesh Bank Hackers Compromised SWIFT

Attackers who stole $81 million from the Bangladesh central bank hacked into software from the SWIFT financial platform.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-26

How To Deal With The Rising Tide Of Ransomware

Of all the money-making schemes hackers employ, the most prevalent is ransomware.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

SeQure

SeQure

SeQure is a novel cybersecurity and data observability company that offers Fortune 100 and Governments a zero-trust service to continuously monitor large network environments.