FREE TO VIEW


« Back to News

2015-07-06

Online Anonymity Box Distances Your IP Address

In the game of anonymity-versus-surveillance online, the discovery of the user’s IP address usually means game over.

2015-07-06

Cyber Command: A War That Started Long Ago

Israel's decision to establish a cyber command is symbolic. The IDF has been active in cyber wars for years.

2015-07-07

Legality of Target Acquisition: The U.S. Needs a Drone Board

Judge With a Finger on the Trigger? Target acquisition In the lethal drone program is about to become the subject of legal due process.

2015-07-07

The Future Of Algorithmic Personalisation

The content we encounter online seems to repeat the same things again and again. Is there something wrong with personalisation?

2015-07-07

The Changing Face of Cyber Risk for Law Firms

Law firms are a target of choice for cyber criminals due to their frequent & sizeable money transfers.

2015-07-06

China tightens grip over the Internet

US trade groups are worried that China's security policies could stifle their business.

2015-07-06

Keep Calm and Spy On: Why the OPM Hack Won’t Bring Down US Intelligence

The Wilderness of Mirrors: Nothing happened, nothing to see here, move along please ...

2015-07-06

Is The Tech Investment Bubble About To Burst ?

Is the tech industry is in denial about looming threats? There are sufficient indicators for those willing to open their eyes.

2015-07-06

Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using public Wi-Fi to connect to the Internet will be required to register their mobile devices.

2015-07-03

Some Notes About Wassenaar

Wassenaar is an international arms control treaty which has recently added cyberweapons, with painful consequences for IT research.

2015-07-03

World Faces 'bloodless' Cyber War says India’s PM

"A Digital India where cyber security becomes an integral part of national security"

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.