FREE TO VIEW


« Back to News

2015-10-28

Germany Will Make Telecoms Companies Disclose Data To Police.

Despite two previous laws having been ruled unconstitutional, data retention is back in Germany.

2015-10-28

Apple Removes Spy Apps

Apple recently removed several apps from its store that pose a security risk by exposing a person's Web traffic to untrusted sources.

2015-10-28

Banks Under Constant Hacker Attacks

When Hackers are looking to steal as much money as possible as quickly as possible, they go where the money is.

2015-10-28

Jobs Are Disappearing to the Digital Revolution

Gartner is forecasting some major changes in technology, especially in areas like 3D printing, machine learning and voice recognition.

2015-10-26

Your Personal Safety. There’s An App For That

A crowd sourced App that enables you to reach out for help to other users nearby.

2015-10-27

New Software To Identify ISIS Recruiters

Russian researchers are working on new computer software to locate potential ISIS recruiters online.

2015-10-27

UK Cybercrime & Online Fraud on the Rise

The changing face of crime in Britain has been underlined by new official data showing the growing threat of cyber crime and online fraud.

2015-10-27

Who Is responsible For Security in the Cloud?

Ponemon Survey: Only one third of respondents are confident the Cloud meets their security objectives.

2015-10-27

IBM Gives China Access to Software Code

IBM is giving the Chinese government access to some software code to demonstrate the security of its products.

2015-10-30

China Still Hacking US Firms Despite Xi’s Vow

Chinese government hackers have attempted to penetrate US company networks despite a pledge they would not do so.

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.