FREE TO VIEW


« Back to News

2015-09-02

US Insurance Underwriters Launch Cyber Security Program

Insurance Industry support proposals for a reputable certification for Internet of Things products.

2015-09-02

Countdown: 10 Things Cyber Crooks Could Do To Your Computer, Without Even Touching It

Your computer may not have symptoms, but it may still be infected.

2015-09-02

Hack on United Airlines Makes CIA's Job More Difficult

Stolen medical and financial records, may now include US intelligence officials’ travel itineraries from the world’s second-largest airline.

2015-09-02

Cyber Attack on US Power Grid Will Cost $1 Trillion

Thirty two percent of U.S emergency responses to cyber security threats occurred in the energy sector.

2015-09-01

Black Hat Budgeting: What would you do with US$1 million?

A thought Experiment by Richard Bejtlich of Tao Security

2015-08-31

Biometric Security: From A Selfie To the Way You Walk

The mobile, cloud, banking & payments industries must prepare for the shift from traditional authentication to new biometric systems.

2015-08-31

Hacking For Cause: Growing Cyber Security Trend

What is the hacker motive if not for financial gain and is there is an evolving definition of right and wrong regarding hacking?

2015-08-31

Darkhotel Deploys Zero-Day From Hacking Team

Darkhotel: Latest research shows how the spy crew continues to evolve its cyber espionage methods.

2015-08-28

Seamless Technology Is a Gift for Cybercriminals

With cybercrime estimated to costs businesses more than $2tn by 2019, Marc Goodman says design is our best defence.

2015-08-28

Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

American Sniper? A cyber hack that can disable the weapon from a distance, or at least manipulate it into not working properly.

2015-08-28

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.