Commvault partners with Pure Storage » Cisco Live, Melbourne, AU and Tinton Falls, NJ: Commvault has announced the integration of its Commv... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTOR... » A treatise on pastoral jihadism, islamism, arabism and cultural imperialism in Nigeria (Ephesians ... Where was Aisha Buhari when idiot Kumapayi flagr... » "Clip-clip..clip-clip...Did you not hear when BABA DAURA say women's place is in the kitchen?" ... UKCloud launches Disaster Recovery to the Cloud se... » London: UKCloud has announced the launch of Disaster Recovery to the Cloud, a self-service replicati... ADG Holdings bolsters security protection with Tra... » SAN MATEO, CA : TrapX Security™ has announced that ADG Holdings, a provider of proprietary trading a... ExtraHop combines analytics and low-cost storage... » London, UK: ExtraHop has announced several major platform enhancements as part of version 6.2. These... DEFENCE MINISTER MEETS TEENAGERS TAKING PART ... » Defence Minister Earl Howe today met teenagers at the Army’s first ‘Supercamp’, a new initiative whi... SONG OF THE SEASON » Also, visit: APC, SO-SO TALK-TALK, SO-SO MOTIONS-MOTIONS, NO ACTION ... EEMBC and prpl align to drive use of hypervisors t... » SANTA CLARA, CALIF: Recently the prpl Foundation and EEMBC announced a formal partnership to advance... Qognify helps Navi Mumbai in the making of a safe ... » Qognify has announced the successful implementation of its market-leading Safe City solution in Navi...



Cyber Security and e-Crime

# Article Title Author
151 UK cyber defence unit 'may include convicted hackers' DWAYNE MELANCON, LAMAR BAILEY, TIM ER
152 How UK energy sector can prevent cyber attack Lila Kee, chief product officer, GlobalSign
153 DDoS perpetrators changed tactics in Q3 2013 to amplify attack sizes and hide identities MICHAEL DONNER
154 MOD cybersecurity plans do not scale Robert Hansen, Technical Evangelist, WhiteHat Security
155 Britain to build capability to counter-attack in cyberspace The Editorial Team
156 FireEye outlines distinctive national and regional characteristics of nation-State driven cyber attacks DARSHNA KAMANI
157 First Cyber Security Challenge battle at the historical home of British code-breaking finds new finalists DAWN NICHOLLS
158 SAS tackles crime head on with powerful public security software The Editorial Team
159 New Industrial Control Systems Cyber Security Certification in Development DAWN NICHOLLS
160 Search for new UK cyber defenders takes place at the historical home of British code-breaking for the first time DAWN NICHOLLS