FREE TO VIEW


« Back to News

2015-06-21

Magnitude Exploit Kit Adobe Flash Player Vulnerability

An example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits.

2015-06-21

New Snowden Documents Reveal US Spying Has Actually Expanded

U.S Surveillance of international Internet traffic is expanding in the search for evidence of malicious computer hacking.

2015-06-21

Understand Mobile Deep Linking

Dozens of startups have launched around using, improving & discovering deep links. So, what are deep links and where did they come from?

2015-06-19

What’s in the New UK Surveillance Bill?

The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance?

2015-06-19

Got Good Cyber Insurance Cover? Beware of Holes in Your Policy.

Just because you have “cyber insurance” doesn't mean your insurer will pay a cyber-related claim.

2015-06-18

Digital Currencies: A Gold Standard for Bitcoin

Bitcoin-like currencies backed by the yellow metal show promise for crisis-scarred libertarians.

2015-06-17

UK MOD to Build Open Source Analytics Platform

The MOD wants a new open source analytics platform to help understand its data.

2015-06-16

Australia is 'one of most aggressive' in Mass Surveillance

Snowden supporters say Australia’s new data retention laws are 'dangerous'.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

2015-06-16

PWC 2015 Information Security Breaches Survey

PWC survey aims to provide greater awareness amongst UK business on how companies are (not) mitigating cyber risks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

Vizius Group

Vizius Group

The Vizius Group are a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.