About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • China’s Quest for Cybersecurity Causes Headache for Foreign Companies

    March 18, 2017

    “There is no national security without cybersecurity,” declared President Xi Jinping at the inaugural meeting of the Central Leading Group for Cybersecurity and Informatization in February 2014. His words acted as the starter’s gun for a cyberspace regulation marathon in China. Since then, Chinese authorities have tightened the state’s control over all things cyber: from ...

  • Three Quarters of UK Firms Reported Data Breaches or Infections in 2016

    March 17, 2017

    Security issues among British companies are extremely high, with 75% of firms admitting they have experienced a data breach in the last year. The data comes from a research ordered by Cyren, a cloud-based security company, and indicates that when it comes to businesses with 1000 or fewer employees, the figure rises to 85%. “There is a ...

  • Government Cybersecurity Contractor Hit in W-2 Phishing Scam

    March 17, 2017

    Just a friendly reminder that phishing scams which spoof the boss and request W-2 tax data on employees are intensifying as tax time nears. The latest victim shows that even cybersecurity experts can fall prey to these increasingly sophisticated attacks. On Thursday, March 16, the CEO of Defense Point Security, LLC — a Virginia company that ...

  • ABTA hack sees personal details of 43,000 people exposed

    March 16, 2017

    Yahoo, Adult Friend Finder, LinkedIn, Tumblr and Daily Motion all have something in common: in 2016, details of massive hacks perpetrated against the companies were disclosed. The firms represent a handful of the companies and public bodies around the world that suffered at the hands of hackers last year. Data compromised usually included names, emails, ...

  • Why is incident response automation and orchestration so hot?

    March 16, 2017

    I couldn’t attend the RSA Conference this year, but many cybersecurity professionals and my ESG colleagues told me that incident response (IR) automation and orchestration was one of the hottest topics in the halls of the Moscone Center—through the bar at the W hotel and even at the teahouse on the garden at Yerba Buena. Was ...

  • The Fast-Growing Job With A Huge Skills Gap: Cyber Security

    March 16, 2017

    Behind every new hack or data breach, there’s a company scrambling to put out the fire. That’s good news for job seekers with cyber security skills. Employers can’t hire them fast enough. The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. Every ...

  • What’s In Shodan? Analyzing Exposed Cyber Assets in the United States

    March 15, 2017

    The United States is home to millions of unsecured and exposed cyber assets. By “unsecured” and “exposed” we don’t necessarily mean that these devices have already been compromised. Rather, this means they are vulnerable to cyber attacks due to inadequate security or poor configuration. Some cyber assets may even have remote access enabled for troubleshooting ...

  • NSA hacking chief’s mission impossible: Advising White House on cybersecurity

    March 15, 2017

    NSA hacking crew bossman Rob Joyce is set to join US President Donald Trump’s National Security Council as a cybersecurity adviser. Joyce headed up the NSA’s Tailored Access Operations division, the spy agency’s elite computer exploitation squad. Whispers have been sloshing around since the weekend that Joyce was tapped to shape cybersecurity policy for the Trump administration. ...

  • Cyber security: Experts warn on rise of hacker ransoms

    March 14, 2017

    Smartphones, watches, televisions and fitness trackers could be used to hold people to ransom over personal data, cyber security experts have warned. Ransomware, which makes devices unusable until their owners pay to unlock them, has become increasingly prevalent in the past year, they say. Devices holding photos, emails and fitness information could be targeted. The risk to business ...

  • Almost All Security Professionals Fear an Increase in Attacks on Industrial IoT

    March 14, 2017

    As nice as it is to have a connected world, the security threats brought on by the desire to have every device we own connected to the Internet are great. In fact, a staggering 96% of IT security professionals expect an increase in attacks on industrial Internet of Things. According to a new survey published by ...

  • Germany’s Merkel warns against cyber attacks on infrastructure

    March 14, 2017

    German Chancellor Angela Merkel said on Tuesday protecting infrastructure from potential cyber attacks was a top priority and the federal government had to work together with localities on that. “Today we have a huge amount of possibilities to paralyze infrastructure from cyber attacks and it is… very very difficult. There are examples from Ukraine that are ...

  • Cybercriminals getting as good as nation state spies – report

    March 14, 2017

    The European energy sector is being targeted by advanced threat actors seeking proprietary information to advance the capabilities of domestic companies, according to FireEye Mandiant. The latest annual report by FireEye’s incident response arm further warns that cyber threat groups are also targeting European industrial control systems for potentially disruptive or destructive operations. The capability of cybercriminals ...