This Newsletter reaches over 5,000 IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities.
Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks. read more
The challenge in building cybersecurity resilience is that it is not only about software, code and laws, but also about people. read more
Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders. read more
Many large companies would prefer to pay ransom to avoid public shaming and the other devastating public consequences of a security breach. read more
Over 70% of the world's population will live in urban areas by 2050 - but don't think that means you will be able to get lost in the crowd. read more
Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on. read more
Airplane Mode: Advances in electronics now mean that just about anything with a power source can be turned into an explosive. read more
Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies. read more
The evolution of cybercrime has hit a peak with ransomware and Bitcoin. One of the strange features of this is how much of it is in public. read more
A US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name. read more
Facebook founder Mark Zuckerberg has outlined a plan to let Artificial Intelligence software review content posted on the global social network. read more
Remote and autonomous weapons raise new questions about the boundaries between peace and war, also the nature of future conflicts. read more
Non-state political groups like Hamas have developed state-like hacking, espionage and surveillance capabilities. read more
There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk. read more
Four years after the renegade NSA employee first leaked details of its secret international surveillance activities, Snowden still makes news. read more
National and local newspapers are dying, while Facebook along with Google controls two-thirds of the online advertising market. read more
In addition to this free Weekly Newsletter with controlled website access, Cyber Security Intelligence now offers a Premium Subscription. Premium Subscribers have Unlimited Website Access including to the Directory of 1,000+ specialist Service Providers plus the Directors Report, an exclusive monthly email with original news and analysis designed to help Business Leaders & Decision-makers stay up to date with the key issues in cyber security: SUBSCRIBE
Subscription Information & Commercial Partners Contact Us Here: Inquiries