FREE TO VIEW


« Back to News

2015-10-07

The Rules of Cyberspace Just Got A Bit Clearer

United Nations has made recommendations guiding state activity in cyberspace which break new ground.

2015-10-07

Where’s The Money in Data?

How do we use data to drive revenue?

2015-10-12

Cyber Insurance Policies: Worth the Money?

The global cyber insurance market is expected to triple in size, reaching an estimated $7.5 billion in annual premiums by the year 2020.

2015-09-18

Bitcoin Made Official by US Trade Commission

The US Commodity Futures Trading Commission has ordered that bitcoin be treated as an official commodity and regulated accordingly.

2015-10-12

Should US Hacked Federal Employees Lose Security Clearance?

At least one federal chief information security officer is concerned about how frequently senior federal employees fall for the bogus emails.

2015-10-09

These Facts Explain the Threat of Cyber Warfare

Five factors explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

2015-10-07

21 Announces the Bitcoin Computer

Buying and running a bitcoin miner just got a little easier. And there is a micropayment capability included.

2015-10-07

Hackers Burrow Into Apple's Walled Garden

The walled garden has a rather nasty infestation. Several Chinese apps were discovered to contain code that could steal user information.

2015-10-07

Six Emerging CyberSecurity Risks

NY Cyber Security Summit: A panel of experts recently discussed emerging cybersecurity risks. Here is what you need to know.

2015-10-07

'Hackers for Hire'- Major Police Effort To Fight Criminal Gangs.

A “small number” of hackers offer "cybercrime as a service” creating a market a for criminal gangs to bid for targets to be attacked.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.