FREE TO VIEW


« Back to News

2016-06-17

The Death of the Password Is Upon Us

The traditional password is losing its foothold as the standard in authentication.

2016-06-17

Son Of Stuxnet: Irongate Malware

Newly discovered malware targeting industrial control systems has the researchers who discovered it intrigued.

2016-06-17

Pentagon ‘Misleads’ Over Location of UK Intelligence Centre

The Pentagon used “inaccurate or misleading” information to justify its choice of RAF Croughton for an ultra-secure intelligence analysis centre.

2016-06-17

Raytheon Says $1Billion Cyber Contract Confirmed

The US Department of Homeland Security has confirmed a $1 billion contract won by Raytheon to protect dozens of federal agencies from cyber threats.

2016-06-16

Russian Hi-Tech Spy Devices

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy & data monitoring.

2016-06-23

Managing The Rise Of The Killer Robots

Humanity stands at an inflection point as innovations in AI outpace evolution in governance mechanisms. Opinion By Anja Kaspersen

2016-06-15

Who’s Stealing The Money? SWIFT Tightens Security As A Fourth Bank Is Attacked.

The international bank money transfer system is suffering multiple attacks from a mystery assailant using the same type of code as used to hack Sony.

2016-06-15

Human Error Fuels Most Breaches

Many breaches are caused by methods of working that are known as data breach pitfalls.

2016-06-15

Harvard Business School Wants To Know How To Win At Cybersecurity

HBS graduates now running cybersecurity companies discuss the lessons they have learned and identify some solutions.

2016-06-15

Tor’s Developer Leaves After Lurid Sexual Allegations

Senior Tor developer, Wikileaks hacker and Snowden advocate is forced to resign after rumors of assault emerged online.

2016-06-14

How To Define Cyberwar

What is it that is keeping US Intelligence and Military chiefs awake at night?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.