FREE TO VIEW


« Back to News

2015-01-07

Mass Surveillance: The Internet’s best engineers are fighting back

The Internet Engineering Task Force (IETF) has played down suggestions that the NSA is weakening the security of the Internet through its standardization processes...

2015-01-06

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?

The US will sanction North Korea by an executive order signed by President Obama, which will target ten North Korean officials and three government entities. The sanctions are in response to the December hack on Sony that the US blamed on North Korea.

2014-12-23

New York premiere of Sony film The Interview cancelled

The New York premiere of The Interview, a comedy about the assassination of North Korea's president, has been cancelled amid threats from hackers. Now Sony Pictures has cancelled the planned US release on 25 December of the film The Interview, after major cinema chains decided not to screen it.

2014-12-10

150 million cars will be connected to the Internet by 2020

In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc. By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

2014-12-10

North Korea continues cyber warfare against Sony

For the past few weeks, entertainment giant Sony Pictures has seen its computers paralysed by a cyberattack.

2014-12-04

Why REGIN Isn't The New STUXNET

Stuxnet was designed for sabotage, whereas Regin was likely designed for espionage and as a result was deployed with a great deal more of precision.

2014-12-01

MH370: new drift improves search in Australia

Australia is working on new drift modeling to expand the geographical area in which wreckage from missing Malaysia Airlines flight MH370 may come ashore, the Australian search coordinator said on Wednesday.

2014-05-06

Most UK Police Forces don’t investigate Cyber Crime

Ninety Percent of the UK’s Police have no Tactical or Strategic plans for monitoring, training PCs and reducing cyber crime.

2014-07-22

10 Cyber Security Predictions for 2015

Active defensive and offensive security continues to rise

2014-09-29

Desmond investment bets on spooks to win cyber war

There are few Irish investors better than Dermot Desmond at spotting the next big thing. His latest investment in Vahna, a cyber-security firm, comes less than two years after Edward Snowden began to massively leak information about the secret world of technology espionage.

2014-10-08

Why we need Tor now more than ever

Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.