FREE TO VIEW


« Back to News

2015-12-06

Cyber Warfare Is Integral To Modern International Politics

Cyber-operations are being used for information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine.

2015-12-06

IoT Turns Cities Into Cyber Battlegrounds

The Internet of Things is racing ahead of the current state of the art in cyber security, leaving many devices vulnerable to attack.

2015-12-06

OPM Hack Was Criminal - Not China Government Sponsored

Surprise: China's official investigation into the massive breach affecting 22 million US federal workers finds it was a criminal enterprise.

2015-12-02

Five Cyber Security Predictions for 2016

Experts at Forrester Research give their five cybersecurity predictions and resulting actions to be taken in 2016.

2015-12-04

N. Korea Employs Grads for Cyber Warfare

North Korea is reportedly recruiting graduates from Pyongyang University of Science & Technology for cyber warfare.

2015-12-02

Anonymous’ Cyberwar With ISIS And It’s Unintended Consequences.

Efforts to take down ISIS Web sites may have unintended security consequences for carefully planned law enforcement operations.

2015-12-02

Bitwalking: Digital Currency Pays People to Walk

Bitwalking dollars will be earned by walking, unlike other digital currencies such as Bitcoins that are "mined" by computers.

2015-12-02

Coinbase Shift Payments To Bitcoin Debit Card

A debit card integrating all your currencies, both real and virtual, together in one payment source.

2015-12-02

Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation

Investors see that what makes Tanium unique is its ability to detect and fix enterprise security threats quickly.

2015-12-04

Russian Financial Cybercrime

Russian cyber criminals have evolved and gained a reputation for sophisticated financial crime; it's top flight are believed to have stolen over $790m.

2015-12-02

Cyber Threat From Within

A rogue employee can do at least as much damage as a rogue nation.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Valmet

Valmet

Valmet is a leading global developer and supplier of process technologies, automation and services for the pulp, paper and energy industries.

Emagine IT

Emagine IT

Emagine IT supports federal agencies and enterprises by leveraging a data-first approach to delivering cutting-edge IT, cybersecurity, and digital transformation services.