FREE TO VIEW


« Back to News

2015-11-18

Thailand’s Military to Set Up New Cyberwar Unit

Thailand will establish a new group to counter growing cyber threats. The move follows plans by the ruling junta for a single Internet access point.

2015-11-18

FBI Takes Down Alert on Chip & PIN Credit Cards

The American Bankers Association are not happy about the FBI's warning to consumers on the risks on new Chip & PIN credit cards.

2015-11-18

Cybercrime: How to Recognize an Online Fraudster

The switch to Chip & PIN cards in the US is driving attempts to profile online fraudsters. The results may surprise you.

2015-11-21

Cyber War and Real War Coincide In Ukraine

The type of cyber war that the US government and military are most worried about is already in full swing in the Ukraine.

2015-11-18

Mystery Fingers on Keyboard in JPMorgan Hack

The identity of a master hacker behind the biggest attack ever on the US financial system is being withheld by prosecutors. Why is that?

2015-11-21

State-sponsored Cyberspies

FireEye have discovered an attack campaign that injects computer profiling & tracking scripts into over 100 security- sensitive Russian websites.

2015-11-17

Low-tech Coppers in the UK

Reported crime is down but with big budget cuts, aging technology & new cybercrime challenges, a policeman's lot is not a happy one.

2015-11-18

How the Threat Landscape Will Change By 2020

McAfee Labs attempt to predict how the types of threat actors will change and how the industry will meet these challenges over the next five years.

2015-11-19

Artificial Intelligence Could Drive Human Inequality

A new report suggests that the marriage of AI and robotics could replace so many jobs that the era of mass employment could come to an end.

2015-11-17

'Jihadi John' Strike: US Says 'We Got Him'

Live by the sword, die by the sword. Extrajudicial execution by drone strike of notorious ISIS killer.

2015-11-17

50% of US Businesses Have No Formal BYOD Policy

Years after the widespread adoption of workplace smartphones, most US companies don't have a bring your own device policy to safeguard security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Bastion Technologies

Bastion Technologies

All your cyber defense. One platform. Keep your business assets and employees safe under one roof. Manage your cyber defense quickly, easily & efficiently.

Daisy Corporate Services

Daisy Corporate Services

Daisy is one of the largest providers of communications and IT solutions across the UK, with a portfolio spanning unified communications, cloud, cyber security and resilience.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.