FREE TO VIEW


« Back to News

2015-02-24

Dramatic Improvement in Intelligence Sharing Because of ISIS

European countries are voluntarily providing the United States with large amounts of information about their citizens, particularly as those citizens attempt to travel, the nation's top counterterrorism official said

2015-02-23

Cybercrime and the value of personal data

Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime.

2015-02-24

NSA Surveillance Software Infecting Thousands of Computers Worldwide

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from a cybersecurity company that points toward the US National Security Agency.

2015-02-18

BMW Fixes Flaw risking 2.2 Million Cars to Break-In

German luxury carmaker BMW has fixed a security flaw that could have allowed hackers to unlock the doors of up to 2.2 million Rolls-Royce, Mini and BMW vehicles.

2015-02-18

France's Online War Has A New Cyber Security Cell

France has declared what some are calling a war on terror in the wake of the attacks on the Charlie Hebdo magazine and Hyper Cacher market, and a number of the battles are expected to be waged online. The government has announced new policies aimed at preventing cyber attacks by Islamist hacking groups and online recruitment by extremist groups targeting French youth.

2015-02-18

North Korea Threatens 'Gangster' US With Nuclear Strikes, Cyber Warfare and Rules Out Talks

In an apparent reaction to recent comments from US President Barack Obama, who spoke of an eventual collapse of the North Korean regime, the country's National Defence Commission (NDC) said that Obama's statement revealed Washington's goal to "bring down" North Korea. NDC, the country's top military body, is headed by North Korean leader Kim Jong Un.

2015-02-19

Memex – The new search tool and for the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex, which will improve also researches into the "Deep Web".

2015-02-19

Deep Dive: A Guide to the Deep-Web for Law Enforcement

There’s a part of the Internet known as the deep web. It is called the deep web because of its massive size, it’s literally ‘deep’. According to The Guardian, you can only access 0.03% of the internet via search engines like Google and the rest is what makes up the deep web.

2015-02-19

Cyber Warfare: Technology backfires on the powerful.

Cyber warfare is fast becoming the most progressive military technology since the Second World War. This rapid progression raises the question of identifying which global actors benefit most from a new found cyber capability.

2015-02-18

US Cyber Intelligence Agency – Will it work?

The Obama administration is about to create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

2015-02-16

Data Breaches in Europe

Reported Breaches of Compromised Personal Records in Europe, 2005 - 2014

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.