FREE TO VIEW


« Back to News

2015-09-09

Anonymous Launches Cyber-Attacks Against ISIS

Hacktivists are targeting and attacking the online network of supporters & suspected websites of ISIS.

2015-09-08

US Intelligence Keys in on the Russian ‘Troll Army’ Manipulating Social Media

False Open Sources: US Intelligence thinks that Russia is skilful at using social media to generate propaganda.

2015-09-09

Snowden Has No Plans to Leave Russia

His lawyer says it's all fine and dandy in Moscow, although Edward Snowden is not considering applying for Russian citizenship. Yet.

2015-09-09

Humans Should Ban Artificially Intelligent Weapons

Manufacturers & governments developing lethal AI weapons claim proper safeguards can be engineered. We doubt it.

2015-09-09

MH370 Gentle Landing Theory

Opinion By OliverMcGee

2015-09-08

Hackers Target Saudi Government Websites

Over 24 Saudi government websites have been hacked despite the fact that the hackers gave advance warning.

2015-09-09

Pentagon to Wage War on DDOS Attacks

New tools enabling the U.S. Defense Department to make a rapid response to distributed denial-of-service attacks.

2015-09-09

Pentagon Increasing Drone Flights By 50%

The Pentagon is planning to increase the number of drone flights by 50% to meet the US demands for surveillance & air strikes.

2015-09-08

Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat

Anonymous Malaysia threaten Internet 'Warfare'

2015-09-08

Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.