FREE TO VIEW


« Back to News

2016-01-19

Mandatory Requirement on Business To Disclose Cyber Attacks

Companies that do not “come clean” about being the victims of cyber crime should face prosecution, says British MP.

2016-01-21

Can the Warfare Concept Of Manoeuver Be Usefully Applied In Cyber Operations?

Although the cyber domain has unique characteristics, the timeless principles of manoeuver warfare still apply. Opinion by David Gioe

2016-01-18

ISIS Has a New Secure Messaging App

An encrypted Android app for exchanging secure messages, joining another app that distributes propaganda and recruiting material.

2016-01-15

Five Things That Happened To Data In 2015

2015 was a fascinating and challenging year for all those involved with data. Here are the 5 most significant. Opinion by David Reed of DataIQ

2016-01-15

US Critical Infrastructure Is Vulnerable To Electromagnetic War

An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital & non-vital services.

2016-01-15

NSA Chief Says The Rules of War Do Apply to Cyberwar

The Pentagon keeps its rapidly expanding cyber arsenal almost entirely secret.Is there a way to publicly discuss the future of cyber operations?

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

2016-01-13

Experts Make 2016 Cybersecurity Predictions

A new frontier of data breach issues is on the horizon

2016-01-14

Cyberwar Represents An Existential Threat

The advent of cyberwar represents a new “high bar risk” as the U.S. faces-off against a deadly triad of cutting-edge digital technologies.

2016-01-13

Is The Password Dead?

Will 2016 be the year when passwords become obsolete? Or will we just continue to grin and bear it? What’s the matter with passwords, anyway?

2016-01-13

Indian ‘Black Hats' Hack Pakistani Websites

A group of Indian hackers hacked and vandalized seven Pakistani websites including that of Pakistani Lawyers' Bar Council.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Messageware

Messageware

Messageware is the market leader in securing, enhancing, and customizing Microsoft Exchange and Outlook Web App.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

SeQure

SeQure

SeQure is a cutting-edge startup specializing in the development of advanced security infrastructure for artificial intelligence and blockchain.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.