This Newsletter reaches over 5,000 IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities.
The ransomware attack highlights a dependence on interconnected technology & the massive challenge to secure the software systems we rely on. read more
The attack has served as a live demonstration of a new type of global threat, one that could encourage future hackers. read more
President Macron's campaign team thwarted Russian hackers, showing a level of ingenuity missing in Hillary Clinton’s failed presidential campaign. read more
Their chosen false names, like 'Cozy Bear', 'The Dukes' and 'APT29' make them sound like street gangs. The reality is somewhat different. read more
There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. read more
Insurers see coverage against hackers as one of their most promising markets, estimating that premiums will triple over the next four years. read more
Web-connected industrial robots used in factories and logistics are insecure, leaving companies wide open to cyber attacks & costly damages. read more
The "live" surveillance of British web users' internet communications is proposed in a draft technical paper prepared by the UK government. read more
EU countries are working on strengthening their national security and cyber defence infrastructure. read more
Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development. read more
Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas. read more
Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information. read more
The two terms are sometimes used interchangeably, although they have different meanings. read more
A Sinister Agenda: Criminals could deploy Artificial Intelligence to commit "terrorist acts or murders". read more
Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted. read more
Quick Detection & Respone: A phishing scam used Google Docs in an attack against at least 1 million Gmail users. read more
In addition to this free Weekly Newsletter with controlled website access, Cyber Security Intelligence now offers a Premium Subscription. Premium Subscribers have Unlimited Website Access including to the Directory of 1,000+ specialist Service Providers plus the Directors Report, an exclusive monthly email with original news and analysis designed to help Business Leaders & Decision-makers stay up to date with the key issues in cyber security: SUBSCRIBE
Subscription Information & Commercial Partners Contact Us Here: Inquiries