FREE TO VIEW


« Back to News

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-24

Why Cybercrime Now Exceeds Conventional Crime

Online crime worldwide is increasingly displacing conventional forms of property crime and often goes unreported and uninvestigated.

2015-09-25

Using Threat Intelligence Against Cybercriminals

Companies and governments do not traditionally share data about successful attacks. Threat Intelligence can fix that.

2015-09-22

The Shocking State of Cybercrime in Russia

Stolen credit cards, fraud, banking information theft & malware infections. Stealing from cryptocurrency wallets ... we could go on.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-22

Vodafone Leaked Email on 'hacking' of Reporter

Vodafone Australia under pressure over the potentially unlawful access of private phone records to track down a journalist’s source.

2015-09-25

UK’s Surveillance Dragnet Legal Challenge

A challenge to UK surveillance legislation aims to discover the scope of illegal data sharing taking place between the NSA and GCHQ.

2015-09-24

State Proxies & Plausible Deniability: Challenging Conventional Wisdom

States use proxies to claim plausible deniability for their cyber attacks. Does this reduce the risk of retaliation? Opinion by Jamie Collier

2015-09-21

Russia in Ukraine & Syria: US Revise Cyber Budget

Russia’s involvement in both Syria & Ukraine and it's overall role in cyberwarfare is the Pentagon's primary concern.

2015-09-21

UK Drone Strike on ISIS Raises Legal Questions

Further clarification is needed on the legal justification for the UK’s drone strike in Syria. Opinion by Harriet Moynihan

2015-09-25

What Does Facebook Want With AI?

Study into artificial intelligence research is no longer the preserve of universities.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.