To get this free weekly Newsletter direct to your inbox Sign Up here
NorthPole: IBM has a new energy efficient 'neural inference' microchip design with the potential to power the next generation of AI, enabling smarter, network-independent devices. read more
Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps. read more
Cognitive Warfare: China understands the power of social media to shape narratives and perceptions of events. Also, how to carry out espionage. read more
Undetected Malware: Capable of intercepting MS Exchange to compromise incoming email, as well as upload & download files from the infected host. read more
AI, Hacktivism & Weaponised Deepfakes: These already familiar threats are evolving, as criminals modify their methods to attack and damage organisations worldwide. read more
Demand for satellite communications and the escalating conflicts in Ukraine and the M. East are driving concerns over securing space-based systems. read more
Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams. read more
Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson read more
Cybersecurity Awareness Month: Seven industry experts share their insight to help organisations navigate the complexities of cybersecurity. read more
A wave of DDoS attacks on Israeli websites has succeeded in knocking some offline but to little effect, causing no lasting damage. read more
How do you comply with ever changing data protection regulations & are they a major impediment to cross-border business? By Katie Simmonds read more
A fault on the CIA’s official TwitterX account has been exploited by a cyber security researcher to hijack a channel used for recruiting spies. read more
Unlocking Cybersecurity: Manufacturing, energy, transport & utility firms offer hackers many entry points to find vulnerabilities. By Edgardo Moreno read more
Should Artificial Intelligence Be Regulated?: Exploring the pros and cons of government intervention in the world of AI. By Roberts & Obradovic Law read more
Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly read more
In addition to this free Weekly Newsletter with controlled website access, Cyber Security Intelligence now offers a Premium Subscription. Premium Subscribers have Unlimited Website Access including to the Directory of 7,000+ specialist Service Providers plus the Directors Report, an exclusive monthly email with original news and analysis designed to help Business Leaders & Decision-makers stay up to date with the key issues in cyber security: SUBSCRIBE
Subscription Information & Commercial Partners Contact Us Here: Inquiries